Bootstrapping and maintaining trust in the cloud N Schear, PT Cable, TM Moyer, B Richard, R Rudd Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 55 | 2016 |
Transparent web service auditing via network provenance functions A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ... Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017 | 53 | 2017 |
Leveraging data provenance to enhance cyber resilience T Moyer, K Chadha, R Cunningham, N Schear, W Smith, A Bates, K Butler, ... 2016 IEEE Cybersecurity Development (SecDev), 107-114, 2016 | 10 | 2016 |
Retrofitting Applications with Provenance-Based Security Monitoring A Bates, K Butler, A Dobra, B Reaves, P Cable, T Moyer, N Schear arXiv preprint arXiv:1609.00266, 2016 | 7 | 2016 |
Security and privacy assurance research (spar) pilot final report B Fuller, D Mitchell, R Cunningham, U Blumenthal, P Cable, A Hamlin, ... Technical report, MIT Lincoln Laboratory Lexington United States, 2015 | 5 | 2015 |
Secure and Resilient Cloud Computing for the Department of Defense PT Cable II, NA Schear, RK Cunningham, VN Gadepally, TM Moyer, ... MIT Lincoln Laboratory Lexington United States, 2015 | 4* | 2015 |
Spyglass: demand-provisioned Linux containers for private network access PT Cable II, N Schear 29th Large Installation System Administration Conference (LISA15), 37-48, 2015 | 1 | 2015 |