D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 50 Citations 9,057 205 World Ranking 3710 National Ranking 1892

Research.com Recognitions

Awards & Achievements

2018 - ACM Senior Member

2011 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Computer security

His primary areas of study are Operating system, Access control, Computer security, Embedded system and The Internet. Trent Jaeger combines subjects such as Enterprise information security architecture, Authorization and Code with his study of Operating system. Trent Jaeger has included themes like Semantics, Cloud computing security and Human–computer interaction in his Access control study.

His work deals with themes such as Computer network and Mobile device, which intersect with Computer security. His work carried out in the field of Embedded system brings together such families of science as Rootkit, Intrusion prevention system and Linux Security Modules. The concepts of his The Internet study are interwoven with issues in Cloud computing, Computer security model and Java applet.

His most cited work include:

  • Design and implementation of a TCG-based integrity measurement architecture (965 citations)
  • Building a MAC-based security architecture for the Xen open-source hypervisor (274 citations)
  • PRIMA: policy-reduced integrity measurement architecture (267 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Access control, Operating system, Distributed computing and Mandatory access control. His research investigates the link between Computer security and topics such as Server that cross with problems in Authorization. His work on Role-based access control and Computer access control as part of his general Access control study is frequently connected to Enforcement, thereby bridging the divide between different branches of science.

Operating system is frequently linked to Enterprise information security architecture in his study. His studies deal with areas such as Software and Set as well as Distributed computing. Mandatory access control is closely attributed to Reference monitor in his study.

He most often published in these fields:

  • Computer security (44.02%)
  • Access control (29.67%)
  • Operating system (22.01%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (44.02%)
  • Access control (29.67%)
  • Exploit (6.70%)

In recent papers he was focusing on the following fields of study:

Trent Jaeger spends much of his time researching Computer security, Access control, Exploit, Operating system and Overhead. His Computer security research is multidisciplinary, relying on both Cloud computing, Server and Host. The study incorporates disciplines such as Control and Software deployment in addition to Access control.

His Exploit study combines topics in areas such as Adversary, Computer network and Attack surface. He is studying Fuzz testing, which is a component of Operating system. His Overhead research incorporates themes from Software, Linux Security Modules, Runtime system and Source code.

Between 2014 and 2021, his most popular works were:

  • TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone (58 citations)
  • AuDroid: Preventing Attacks on Audio Channels in Mobile Devices (53 citations)
  • A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications (48 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer security

His main research concerns Computer security, Overhead, Operating system, Cloud computing and Software. Computer security is closely attributed to System call in his research. His Overhead study integrates concerns from other disciplines, such as Key, Data processing, Embedded system and Legacy system.

The study incorporates disciplines such as Arbitrary code execution and Kernel in addition to Operating system. His research integrates issues of Enhanced Data Rates for GSM Evolution, Correctness, The Internet and Runtime system in his study of Cloud computing. Trent Jaeger combines subjects such as Network element, Granularity and Access control with his study of Distributed computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Design and implementation of a TCG-based integrity measurement architecture

Reiner Sailer;Xiaolan Zhang;Trent Jaeger;Leendert van Doorn.
usenix security symposium (2004)

1569 Citations

PRIMA: policy-reduced integrity measurement architecture

Trent Jaeger;Reiner Sailer;Umesh Shankar.
symposium on access control models and technologies (2006)

459 Citations

Building a MAC-based security architecture for the Xen open-source hypervisor

R. Sailer;T. Jaeger;E. Valdez;R. Caceres.
annual computer security applications conference (2005)

429 Citations

On cellular botnets: measuring the impact of malicious devices on a cellular network core

Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)

312 Citations

Attestation-based policy enforcement for remote access

Reiner Sailer;Trent Jaeger;Xiaolan Zhang;Leendert van Doorn.
computer and communications security (2004)

237 Citations

Methods and arrangements for unified program analysis

Trent R. Jaeger;Lawrence Koved;Liangzhao Zeng;Xiaolan Zhang.
(2008)

235 Citations

Analyzing integrity protection in the SELinux example policy

Trent Jaeger;Reiner Sailer;Xiaolan Zhang.
usenix security symposium (2003)

206 Citations

Using CQUAL for Static Analysis of Authorization Hook Placement

Xiaolan Zhang;Antony Edwards;Trent Jaeger.
usenix security symposium (2002)

202 Citations

Flexible and dynamic derivation of permissions

Rangachari Anand;Frederique-Anne Giraud;Nayeem Islam;Trent Ray Jaeger.
(1997)

162 Citations

Practical safety in flexible access control models

Trent Jaeger;Jonathon E. Tidswell.
ACM Transactions on Information and System Security (2001)

157 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Trent Jaeger

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 57

Xinwen Zhang

Xinwen Zhang

Samsung (South Korea)

Publications: 42

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 34

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 29

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 28

Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

Publications: 27

Jean-Pierre Seifert

Jean-Pierre Seifert

Technical University of Berlin

Publications: 25

Kevin R. B. Butler

Kevin R. B. Butler

University of Florida

Publications: 23

Liviu Iftode

Liviu Iftode

Rutgers, The State University of New Jersey

Publications: 21

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 20

Claudia Eckert

Claudia Eckert

The Open University

Publications: 20

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 20

Jonathan M. McCune

Jonathan M. McCune

Google (United States)

Publications: 19

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 19

Bryan Parno

Bryan Parno

Carnegie Mellon University

Publications: 19

Patrick Traynor

Patrick Traynor

University of Florida

Publications: 19

Trending Scientists

Reza Rejaie

Reza Rejaie

University of Oregon

Thomas K. Caughey

Thomas K. Caughey

California Institute of Technology

Chin-Pao Huang

Chin-Pao Huang

University of Delaware

Olaf S. Andersen

Olaf S. Andersen

Cornell University

Leandro V. Ferreira

Leandro V. Ferreira

Museu Paraense Emílio Goeldi

Richard H. Ree

Richard H. Ree

Field Museum of Natural History

Miles H. A. Keenleyside

Miles H. A. Keenleyside

University of Western Ontario

Yuri Nikolsky

Yuri Nikolsky

F1 Genomics

Markku Tammi

Markku Tammi

University of Eastern Finland

Ulrich Bienzle

Ulrich Bienzle

Charité - University Medicine Berlin

Douglas F. Nixon

Douglas F. Nixon

Cornell University

Kathryn J. Wood

Kathryn J. Wood

University of Oxford

Geert Jan J. M. Stams

Geert Jan J. M. Stams

University of Amsterdam

Ivo A. Olivotto

Ivo A. Olivotto

University of Calgary

Stéphane Udry

Stéphane Udry

University of Geneva

Something went wrong. Please try again later.