H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 49 Citations 8,891 161 World Ranking 3064 National Ranking 1615

Research.com Recognitions

Awards & Achievements

2018 - ACM Senior Member

2011 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Computer security

His primary areas of study are Operating system, Access control, Computer security, Embedded system and The Internet. Trent Jaeger combines subjects such as Enterprise information security architecture, Authorization and Code with his study of Operating system. Trent Jaeger has included themes like Semantics, Cloud computing security and Human–computer interaction in his Access control study.

His work deals with themes such as Computer network and Mobile device, which intersect with Computer security. His work carried out in the field of Embedded system brings together such families of science as Rootkit, Intrusion prevention system and Linux Security Modules. The concepts of his The Internet study are interwoven with issues in Cloud computing, Computer security model and Java applet.

His most cited work include:

  • Design and implementation of a TCG-based integrity measurement architecture (965 citations)
  • Building a MAC-based security architecture for the Xen open-source hypervisor (274 citations)
  • PRIMA: policy-reduced integrity measurement architecture (267 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Access control, Operating system, Distributed computing and Mandatory access control. His research investigates the link between Computer security and topics such as Server that cross with problems in Authorization. His work on Role-based access control and Computer access control as part of his general Access control study is frequently connected to Enforcement, thereby bridging the divide between different branches of science.

Operating system is frequently linked to Enterprise information security architecture in his study. His studies deal with areas such as Software and Set as well as Distributed computing. Mandatory access control is closely attributed to Reference monitor in his study.

He most often published in these fields:

  • Computer security (44.02%)
  • Access control (29.67%)
  • Operating system (22.01%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (44.02%)
  • Access control (29.67%)
  • Exploit (6.70%)

In recent papers he was focusing on the following fields of study:

Trent Jaeger spends much of his time researching Computer security, Access control, Exploit, Operating system and Overhead. His Computer security research is multidisciplinary, relying on both Cloud computing, Server and Host. The study incorporates disciplines such as Control and Software deployment in addition to Access control.

His Exploit study combines topics in areas such as Adversary, Computer network and Attack surface. He is studying Fuzz testing, which is a component of Operating system. His Overhead research incorporates themes from Software, Linux Security Modules, Runtime system and Source code.

Between 2014 and 2021, his most popular works were:

  • TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone (58 citations)
  • AuDroid: Preventing Attacks on Audio Channels in Mobile Devices (53 citations)
  • A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications (48 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer security

His main research concerns Computer security, Overhead, Operating system, Cloud computing and Software. Computer security is closely attributed to System call in his research. His Overhead study integrates concerns from other disciplines, such as Key, Data processing, Embedded system and Legacy system.

The study incorporates disciplines such as Arbitrary code execution and Kernel in addition to Operating system. His research integrates issues of Enhanced Data Rates for GSM Evolution, Correctness, The Internet and Runtime system in his study of Cloud computing. Trent Jaeger combines subjects such as Network element, Granularity and Access control with his study of Distributed computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Design and implementation of a TCG-based integrity measurement architecture

Reiner Sailer;Xiaolan Zhang;Trent Jaeger;Leendert van Doorn.
usenix security symposium (2004)

1535 Citations

PRIMA: policy-reduced integrity measurement architecture

Trent Jaeger;Reiner Sailer;Umesh Shankar.
symposium on access control models and technologies (2006)

451 Citations

Building a MAC-based security architecture for the Xen open-source hypervisor

R. Sailer;T. Jaeger;E. Valdez;R. Caceres.
annual computer security applications conference (2005)

424 Citations

On cellular botnets: measuring the impact of malicious devices on a cellular network core

Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)

288 Citations

Attestation-based policy enforcement for remote access

Reiner Sailer;Trent Jaeger;Xiaolan Zhang;Leendert van Doorn.
computer and communications security (2004)

230 Citations

Methods and arrangements for unified program analysis

Trent R. Jaeger;Lawrence Koved;Liangzhao Zeng;Xiaolan Zhang.
(2008)

224 Citations

Analyzing integrity protection in the SELinux example policy

Trent Jaeger;Reiner Sailer;Xiaolan Zhang.
usenix security symposium (2003)

205 Citations

Using CQUAL for Static Analysis of Authorization Hook Placement

Xiaolan Zhang;Antony Edwards;Trent Jaeger.
usenix security symposium (2002)

200 Citations

Flexible and dynamic derivation of permissions

Rangachari Anand;Frederique-Anne Giraud;Nayeem Islam;Trent Ray Jaeger.
(1997)

159 Citations

Practical safety in flexible access control models

Trent Jaeger;Jonathon E. Tidswell.
ACM Transactions on Information and System Security (2001)

156 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Trent Jaeger

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 57

Xinwen Zhang

Xinwen Zhang

Samsung (South Korea)

Publications: 42

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 34

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 29

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 28

Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

Publications: 27

Jean-Pierre Seifert

Jean-Pierre Seifert

Technical University of Berlin

Publications: 25

Kevin R. B. Butler

Kevin R. B. Butler

University of Florida

Publications: 23

Liviu Iftode

Liviu Iftode

Rutgers, The State University of New Jersey

Publications: 21

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 20

Claudia Eckert

Claudia Eckert

The Open University

Publications: 20

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 20

Jonathan M. McCune

Jonathan M. McCune

Google (United States)

Publications: 19

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 19

Bryan Parno

Bryan Parno

Carnegie Mellon University

Publications: 19

Something went wrong. Please try again later.