2018 - ACM Senior Member
2011 - Fellow of Alfred P. Sloan Foundation
His primary areas of study are Operating system, Access control, Computer security, Embedded system and The Internet. Trent Jaeger combines subjects such as Enterprise information security architecture, Authorization and Code with his study of Operating system. Trent Jaeger has included themes like Semantics, Cloud computing security and Human–computer interaction in his Access control study.
His work deals with themes such as Computer network and Mobile device, which intersect with Computer security. His work carried out in the field of Embedded system brings together such families of science as Rootkit, Intrusion prevention system and Linux Security Modules. The concepts of his The Internet study are interwoven with issues in Cloud computing, Computer security model and Java applet.
His scientific interests lie mostly in Computer security, Access control, Operating system, Distributed computing and Mandatory access control. His research investigates the link between Computer security and topics such as Server that cross with problems in Authorization. His work on Role-based access control and Computer access control as part of his general Access control study is frequently connected to Enforcement, thereby bridging the divide between different branches of science.
Operating system is frequently linked to Enterprise information security architecture in his study. His studies deal with areas such as Software and Set as well as Distributed computing. Mandatory access control is closely attributed to Reference monitor in his study.
Trent Jaeger spends much of his time researching Computer security, Access control, Exploit, Operating system and Overhead. His Computer security research is multidisciplinary, relying on both Cloud computing, Server and Host. The study incorporates disciplines such as Control and Software deployment in addition to Access control.
His Exploit study combines topics in areas such as Adversary, Computer network and Attack surface. He is studying Fuzz testing, which is a component of Operating system. His Overhead research incorporates themes from Software, Linux Security Modules, Runtime system and Source code.
His main research concerns Computer security, Overhead, Operating system, Cloud computing and Software. Computer security is closely attributed to System call in his research. His Overhead study integrates concerns from other disciplines, such as Key, Data processing, Embedded system and Legacy system.
The study incorporates disciplines such as Arbitrary code execution and Kernel in addition to Operating system. His research integrates issues of Enhanced Data Rates for GSM Evolution, Correctness, The Internet and Runtime system in his study of Cloud computing. Trent Jaeger combines subjects such as Network element, Granularity and Access control with his study of Distributed computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Design and implementation of a TCG-based integrity measurement architecture
Reiner Sailer;Xiaolan Zhang;Trent Jaeger;Leendert van Doorn.
usenix security symposium (2004)
PRIMA: policy-reduced integrity measurement architecture
Trent Jaeger;Reiner Sailer;Umesh Shankar.
symposium on access control models and technologies (2006)
Building a MAC-based security architecture for the Xen open-source hypervisor
R. Sailer;T. Jaeger;E. Valdez;R. Caceres.
annual computer security applications conference (2005)
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)
Attestation-based policy enforcement for remote access
Reiner Sailer;Trent Jaeger;Xiaolan Zhang;Leendert van Doorn.
computer and communications security (2004)
Methods and arrangements for unified program analysis
Trent R. Jaeger;Lawrence Koved;Liangzhao Zeng;Xiaolan Zhang.
(2008)
Analyzing integrity protection in the SELinux example policy
Trent Jaeger;Reiner Sailer;Xiaolan Zhang.
usenix security symposium (2003)
Using CQUAL for Static Analysis of Authorization Hook Placement
Xiaolan Zhang;Antony Edwards;Trent Jaeger.
usenix security symposium (2002)
Flexible and dynamic derivation of permissions
Rangachari Anand;Frederique-Anne Giraud;Nayeem Islam;Trent Ray Jaeger.
(1997)
Practical safety in flexible access control models
Trent Jaeger;Jonathon E. Tidswell.
ACM Transactions on Information and System Security (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Pennsylvania State University
IBM (United States)
Google (United States)
University of Michigan–Ann Arbor
Pennsylvania State University
University of Wisconsin–Madison
Google (United States)
École Polytechnique Fédérale de Lausanne
North Carolina State University
United States Army Research Laboratory
University of Oregon
California Institute of Technology
University of Delaware
Cornell University
Museu Paraense Emílio Goeldi
Field Museum of Natural History
University of Western Ontario
F1 Genomics
University of Eastern Finland
Charité - University Medicine Berlin
Cornell University
University of Oxford
University of Amsterdam
University of Calgary
University of Geneva