Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach., and . International Information Security Workshops, volume 148 of IFIP, page 173-180. Kluwer, (2004)The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle.. IEEE Secur. Priv., 9 (6): 58-60 (2011)MYSEA: the monterey security architecture., , , , , , , and . STC, page 39-48. ACM, (2009)A security architecture for transient trust., , , and . CSAW, page 1-8. ACM, (2008)Architecture for an embedded secure data base management system., , and . ACSAC, page 125-136. IEEE, (1990)Trusted Hardware: Can It Be Trustworthy?, and . DAC, page 1-4. IEEE, (2007)Active Learning with the CyberCIEGE Video Game., and . CSET, USENIX Association, (2011)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 133-152. Springer, (2009)ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows., , and . HICSS, page 6726-6735. ScholarSpace, (2023)Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores., , , and . ESSoS, volume 8978 of Lecture Notes in Computer Science, page 86-101. Springer, (2015)