MAVMM: A Lightweight and Purpose-Built VMM for Malware Analysis

MAVMM: A Lightweight and Purpose-Built VMM for Malware Analysis
Anh M. Nguyen, Nabil Schear, Hee Dong Jung, Apeksha Godiyal, Sam T. King, Hai Nguyen
Annual Computer Security Applications Conference (ACSAC ’09), Honolulu, HI, December 2009.

Last updated on Thursday, June 26, 2014, 1:00 pm

A Medical Database Case Study for Reflective Databases Access Control

A Medical Database Case Study for Reflective Databases Access Control
Lars Olson, Carl A. Gunter and Sarah Peterson Olson
Security and Privacy in Medical and Homecare Systems (SPIMACS ’09), Chicago, IL, November 2009. [PPT]

Last updated on Thursday, June 26, 2014, 1:00 pm

Completeness of Discovery Protocols

Completeness of Discovery Protocols
Alwyn Goodloe and Carl A. Gunter
Assurable and Usable Security Configuration (SafeConfig ’09), Chicago, IL, November 2009.

Last updated on Thursday, June 26, 2014, 1:00 pm

A Conceptual Framework for the Vehicle-to-Grid (V2G) Implementation

A Conceptual Framework for the Vehicle-to-Grid (V2G) Implementation
Christophe Guille and George Gross
Energy Policy, volume 37, issue 11, pages 4379-4390, November 2009. [Related]

Last updated on Monday, December 5, 2011, 4:03 pm

Reflective Database Access Control

Reflective Database Access Control
Lars E. Olson
Doctoral Thesis, University of Illinois at Urbana-Champaign, October 2009. [PPT]

Last updated on Thursday, June 26, 2014, 12:59 pm

Sh@re: Negotiated Audit in Social Networks

Sh@re: Negotiated Audit in Social Networks
Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter and Roy H. Campbell
IEEE International Conference on Systems, Man, and Cybernetics (SMC ’09), San Antonio, TX, October 2009.

Last updated on Thursday, June 26, 2014, 12:59 pm

Cumulative Attestation Kernels for Embedded Systems

Cumulative Attestation Kernels for Embedded Systems
Michael LeMay and Carl A. Gunter
European Symposium on Research in Computer Security (ESORICS ’09), Saint Malo, France, September 2009. The original publication is available at www.springerlink.com [PPT][Related]

Last updated on Thursday, June 26, 2014, 12:59 pm

Model-Checking DoS Amplification for VoIP Session Initiation

Model-Checking DoS Amplification for VoIP Session Initiation
Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter and Jose Meseguer
European Symposium on Research in Computer Security (ESORICS ’09), Saint Malo, France, September 2009.

Last updated on Monday, July 25, 2011, 4:18 pm

Implementing Reflective Access Control in SQL

Implementing Reflective Access Control in SQL
Lars E. Olson, Carl A. Gunter, William R. Cook and Marianne Winslett
23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec ’09), Montreal, QC, July 2009. [PPT]

Last updated on Tuesday, October 18, 2011, 2:44 pm

Strong and Weak Policy Relations

Strong and Weak Policy Relations
Michael J. May, Insup Lee, Carl A. Gunter and Steve Zdancewic
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009.

Last updated on Monday, July 25, 2011, 4:19 pm