The MEERKATS Cloud Security Architecture
Keromytis, A. D., Geambasu, R., Sethumadhavan, S., Stolfo, S. J., Junfeng Yang, Benameur, A., Dacier, M., Elder, M., Kienzle, D., Stavrou, A.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection
Kienzle, D., Persaud, R., Elder, M.
Published in 2010 43rd Hawaii International Conference on System Sciences (01.01.2010)
Published in 2010 43rd Hawaii International Conference on System Sciences (01.01.2010)
Get full text
Conference Proceeding
A logic of composition for information flow predicates
Peri, R.V., Wulf, W.A., Kienzle, D.M.
Published in Proceedings 9th IEEE Computer Security Foundations Workshop (1996)
Published in Proceedings 9th IEEE Computer Security Foundations Workshop (1996)
Get full text
Conference Proceeding
NICE: Network Introspection by Collaborating Endpoints
Kienzle, Darrell, Evans, Nathan, Elder, Matthew
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Published in 2013 IEEE Conference on Communications and Network Security (CNS) (01.10.2013)
Get full text
Conference Proceeding