Sandra Julieta Rueda
Sandra Julieta Rueda
Verified email at - Homepage
Cited by
Cited by
A logical specification and analysis for SELinux MLS policy
B Hicks, S Rueda, L St. Clair, T Jaeger, P McDaniel
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
B Hicks, SJ Rueda, T Jaeger, PD McDaniel
USENIX Annual Technical Conference 7, 34, 2007
FlowFence: a denial of service defense system for software defined networking
AFM Piedrahita, S Rueda, DMF Mattos, OCMB Duarte
2015 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2015
Extending the floodlight controller
LV Morales, AF Murillo, SJ Rueda
2015 IEEE 14th International Symposium on Network Computing and Applications …, 2015
Leveraging software-defined networking for incident response in industrial control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
IEEE Software 35 (1), 44-50, 2017
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
Virtual incident response functions in control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
Computer Networks 135, 147-159, 2018
Sexual intimacy in the age of smart devices: Are we practicing safe IoT?
M Wynn, K Tillotson, R Kao, A Calderon, A Murillo, J Camargo, R Mantilla, ...
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017
Verifying Compliance of Trusted Programs.
SJ Rueda, D King, T Jaeger
USENIX Security Symposium, 321-334, 2008
Flexible security configuration for virtual machines
S Rueda, Y Sreenivasan, T Jaeger
Proceedings of the 2nd ACM workshop on Computer security architectures, 35-44, 2008
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora, M Linares-Vásquez, S Rueda, ...
Empirical Software Engineering 24 (4), 2056-2101, 2019
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
Integrating SELinux with security-typed languages
B Hicks, S Rueda, T Jaeger, P McDaniel
Proceedings of the 3rd SELinux Symposium, 2007
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Blockchain and artificial intelligence for network security
DMF Mattos, F Krief, SJ Rueda
Annals of Telecommunications 75 (3), 101-102, 2020
Comprehensive security for body area networks: A survey
LV Morales, D Delgado-Ruiz, SJ Rueda
Int. J. Netw. Secur 21, 342-354, 2019
Meaningful permission management in Android
LV Morales, SJ Rueda
IEEE Latin America Transactions 13 (4), 1160-1166, 2015
Cut me some security
D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010
Protecting users from" themselves"
W Enck, S Rueda, J Schiffman, Y Sreenivasan, L St. Clair, T Jaeger, ...
Proceedings of the 2007 ACM workshop on Computer security architecture, 29-36, 2007
The system can't perform the operation now. Try again later.
Articles 1–20