Thomas Moyer
Thomas Moyer
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Trustworthy {Whole-System} provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security 15), 319-334, 2015
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
Configuration management at massive scale: System design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
Towards scalable cluster auditing through grammatical inference over provenance graphs
WU Hassan, L Aguse, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
Bootstrapping and maintaining trust in the cloud
N Schear, PT Cable, TM Moyer, B Richard, R Rudd
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs
A Bates, KRB Butler, T Moyer
7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), 2015
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems
A Al Farooq, E Al-Shaer, T Moyer, K Kant
2019 IFIP/IEEE symposium on integrated network and service management (IM …, 2019
Scalable web content attestation
T Moyer, K Butler, J Schiffman, P McDaniel, T Jaeger
IEEE Transactions on Computers 61 (5), 686-699, 2011
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
Justifying integrity using a virtual machine verifier
J Schiffman, T Moyer, C Shal, T Jaeger, P McDaniel
2009 Annual Computer Security Applications Conference, 83-92, 2009
Network-based root of trust for installation
J Schiffman, T Moyer, T Jaeger, P McDaniel
IEEE Secur. Priv. 9 (1), 40-48, 2011
Taming the costs of trustworthy provenance through policy reduction
A Bates, D Tian, G Hernandez, T Moyer, KRB Butler, T Jaeger
ACM Transactions on Internet Technology (TOIT) 17 (4), 1-21, 2017
PROV-GEM: Automated provenance analysis framework using graph embeddings
M Kapoor, J Melton, M Ridenhour, S Krishnan, T Moyer
2021 20th IEEE International Conference on Machine Learning and Applications …, 2021
Automated provenance analytics: A regular grammar based approach with applications in security
M Lemay, WU Hassan, T Moyer, N Schear, W Smith
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
High-throughput ingest of data provenance records into Accumulo
T Moyer, V Gadepally
2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2016
Navy enhanced sierra mechanics (NESM): toolbox for predicting navy shock and damage
T Moyer, J Stergiou, G Reese, J Luton, N Abboud
Computing in Science & Engineering 18 (6), 10-18, 2016
Detecting safety and security faults in plc systems with data provenance
A Al Farooq, J Marquard, K George, T Moyer
2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20