Seguir
Thomas Moyer
Thomas Moyer
Dirección de correo verificada de uncc.edu - Página principal
Título
Citado por
Citado por
Año
Trustworthy {Whole-System} provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security 15), 319-334, 2015
2722015
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
1662017
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
1532010
Configuration management at massive scale: System design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1362009
Towards scalable cluster auditing through grammatical inference over provenance graphs
WU Hassan, L Aguse, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
1302018
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
992018
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
482017
Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs
A Bates, KRB Butler, T Moyer
7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), 2015
462015
Bootstrapping and maintaining trust in the cloud
N Schear, PT Cable, TM Moyer, B Richard, R Rudd
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
422016
Scalable web content attestation
T Moyer, K Butler, J Schiffman, P McDaniel, T Jaeger
IEEE Transactions on Computers 61 (5), 686-699, 2011
402011
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
392010
Justifying integrity using a virtual machine verifier
J Schiffman, T Moyer, C Shal, T Jaeger, P McDaniel
2009 Annual Computer Security Applications Conference, 83-92, 2009
372009
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems
A Al Farooq, E Al-Shaer, T Moyer, K Kant
2019 IFIP/IEEE symposium on integrated network and service management (IM …, 2019
362019
Network-based root of trust for installation
J Schiffman, T Moyer, T Jaeger, P McDaniel
IEEE Secur. Priv. 9 (1), 40-48, 2011
272011
Taming the costs of trustworthy provenance through policy reduction
A Bates, D Tian, G Hernandez, T Moyer, KRB Butler, T Jaeger
ACM Transactions on Internet Technology (TOIT) 17 (4), 1-21, 2017
222017
Automated provenance analytics: A regular grammar based approach with applications in security
M Lemay, WU Hassan, T Moyer, N Schear, W Smith
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
112017
Navy enhanced sierra mechanics (NESM): toolbox for predicting navy shock and damage
T Moyer, J Stergiou, G Reese, J Luton, N Abboud
Computing in Science & Engineering 18 (6), 10-18, 2016
112016
High-throughput ingest of data provenance records into Accumulo
T Moyer, V Gadepally
2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2016
102016
PROV-GEM: automated provenance analysis framework using graph embeddings
M Kapoor, J Melton, M Ridenhour, S Krishnan, T Moyer
2021 20th IEEE International Conference on Machine Learning and Applications …, 2021
92021
Detecting safety and security faults in plc systems with data provenance
A Al Farooq, J Marquard, K George, T Moyer
2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019
92019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20