Seguir
Thomas Moyer
Thomas Moyer
Dirección de correo verificada de uncc.edu - Página principal
Título
Citado por
Citado por
Año
Trustworthy {Whole-System} provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th USENIX Security Symposium (USENIX Security 15), 319-334, 2015
2692015
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
1652017
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
1532010
Configuration management at massive scale: System design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1362009
Towards scalable cluster auditing through grammatical inference over provenance graphs
WU Hassan, L Aguse, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
1282018
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
992018
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
462017
Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs
A Bates, KRB Butler, T Moyer
7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), 2015
462015
Bootstrapping and maintaining trust in the cloud
N Schear, PT Cable, TM Moyer, B Richard, R Rudd
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
412016
Scalable web content attestation
T Moyer, K Butler, J Schiffman, P McDaniel, T Jaeger
IEEE Transactions on Computers 61 (5), 686-699, 2011
402011
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
382010
Justifying integrity using a virtual machine verifier
J Schiffman, T Moyer, C Shal, T Jaeger, P McDaniel
2009 Annual Computer Security Applications Conference, 83-92, 2009
372009
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems
A Al Farooq, E Al-Shaer, T Moyer, K Kant
2019 IFIP/IEEE symposium on integrated network and service management (IM …, 2019
362019
Network-based root of trust for installation
J Schiffman, T Moyer, T Jaeger, P McDaniel
IEEE Secur. Priv. 9 (1), 40-48, 2011
272011
Taming the costs of trustworthy provenance through policy reduction
A Bates, D Tian, G Hernandez, T Moyer, KRB Butler, T Jaeger
ACM Transactions on Internet Technology (TOIT) 17 (4), 1-21, 2017
212017
Navy enhanced sierra mechanics (NESM): toolbox for predicting navy shock and damage
T Moyer, J Stergiou, G Reese, J Luton, N Abboud
Computing in Science & Engineering 18 (6), 10-18, 2016
112016
Automated provenance analytics: A regular grammar based approach with applications in security
M Lemay, WU Hassan, T Moyer, N Schear, W Smith
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
102017
High-throughput ingest of data provenance records into Accumulo
T Moyer, V Gadepally
2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2016
102016
Leveraging data provenance to enhance cyber resilience
T Moyer, K Chadha, R Cunningham, N Schear, W Smith, A Bates, K Butler, ...
2016 IEEE Cybersecurity Development (SecDev), 107-114, 2016
92016
PROV-GEM: automated provenance analysis framework using graph embeddings
M Kapoor, J Melton, M Ridenhour, S Krishnan, T Moyer
2021 20th IEEE International Conference on Machine Learning and Applications …, 2021
82021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20