His scientific interests lie mostly in Operating system, Computer security, Computer network, Computer hardware and Component-based software engineering. His study in Operating system is interdisciplinary in nature, drawing from both State and Service. His work on Secure communication channel and Policy enforcement as part of general Computer security research is frequently linked to Business and Point, thereby connecting diverse disciplines of science.
His Computer network study combines topics from a wide range of disciplines, such as Network access point and Denial-of-service attack. His Computer hardware research is multidisciplinary, incorporating perspectives in Time synchronization and Offset. His Protocol research incorporates elements of Control, Data model, Provisioning and SIMPLE.
The scientist’s investigation covers issues in Operating system, Encryption, Computer hardware, Computer network and Computer security. In his study, State is inextricably linked to Embedded system, which falls within the broad field of Operating system. His research in Encryption intersects with topics in Value, Key and Message authentication code, Cryptography.
His Computer hardware research integrates issues from Process, Metadata and Cache. His work carried out in the field of Computer network brings together such families of science as Memory address and Parallel computing. His Computer security research is multidisciplinary, incorporating elements of Access network and The Internet.
David M. Durham focuses on Encryption, Computer hardware, Cryptography, Key and Metadata. Computer network and Operating system are the two main areas of interest in his Encryption studies. His Computer hardware research is multidisciplinary, incorporating perspectives in Interface, Detector, Direct memory access and Cache.
His studies deal with areas such as Data integrity and Pointer as well as Cryptography. His Data integrity study improves the overall literature in Computer security. His work in Computer security tackles topics such as Instruction set which are related to areas like Server.
David M. Durham mostly deals with Encryption, Key, Operating system, Computer network and Computer hardware. His Encryption study combines topics in areas such as Metadata and Cryptography. In his research on the topic of Key, Information retrieval, Implementation, Processing core and Thread is strongly related with Identifier.
His is involved in several facets of Operating system study, as is seen by his studies on Host, Page table, Virtual machine and Hypervisor. His study in Computer network is interdisciplinary in nature, drawing from both Value, Memory address, Tree, Tree structure and Software. His work deals with themes such as Hook, Detector, Malware, Filter and Callback, which intersect with Computer hardware.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The COPS (Common Open Policy Service) Protocol
J. Boyle;R. Cohen;S. Herzog;R. Rajan.
RFC 2741, IETF (2000)
COPS Usage for Policy Provisioning (COPS-PR)
K. Chan;J. Seligson;D. Durham;S. Gai.
IETF RFC 3084 (2001)
Techniques for self-isolation of networked devices
David M. Durham;Ravi Sahita;Priya Rajagopal;James Kardach.
(2004)
COPS usage for RSVP
J. Boyle;R. Cohen;D. Durham;R. Rajan.
RFC (2000)
Distributing policy information in a communication network
Russell J. Fenger;David M. Durham.
(2000)
Grouping targets of management policies
Hugh F Mahon;David M Durham;Puqi Tang.
(1999)
Method and apparatus for high accuracy distributed time synchronization using processor tick counters
Priya Rajagopal;David M. Durham.
(2001)
Providing protected access to critical memory regions
Uday Savagaonkar;Travis T. Schluessler;Hormuzd Khosravi;Ravi Sahita.
(2007)
Prevention of denial of service attacks
Priya Govindarajan;David M. Durham.
(2002)
Hierarchical Trust Based Posture Reporting and Policy Enforcement
Hormuzd Khosravi;David Durham;Karanvir Grewal.
(2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Intel (United States)
Intel (United States)
Intel (United States)
Intel (United States)
Princeton University
Cisco Systems (United States)
Google (United States)
FINsix Corporation
University of Haifa
Emory University
Kodak (United States)
Facebook (United States)
University of Hong Kong
University of Rennes
University of Santiago de Compostela
University of Barcelona
University of Hong Kong
Linköping University
École Normale Supérieure de Lyon
California Institute of Technology
University of the Basque Country
Maastricht University
Wayne State University
Feinstein Institute for Medical Research
University of California, Los Angeles