Darrell Kienzle
Darrell Kienzle
Distinguished Technologist, HPE
hpe.com의 이메일 확인됨
제목
인용
인용
연도
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid Malcode, 1-10, 2003
3292003
Efficient backups using dynamically shared storage pools in peer-to-peer networks
MP Spertus, S Kritov, DM Kienzle, HF Van Rietschote, AT Orling, ...
US Patent 7,529,785, 2009
1712009
A new model of security for distributed systems
WA Wulf, C Wang, D Kienzle
Proceedings of the 1996 workshop on New security paradigms, 34-43, 1996
891996
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
802002
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
572016
Preventing data from being submitted to a remote system in response to a malicious e-mail
D Kienzle, J Croall
US Patent 7,516,488, 2009
572009
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
DARPA, Washington DC, 2002
512002
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
372014
The meerkats cloud security architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
2012 32nd International Conference on Distributed Computing Systems …, 2012
352012
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
352002
A practical approach to security assessment
DM Kienzle, WA Wulf
Proceedings of the 1997 workshop on New security paradigms, 5-16, 1998
351998
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
312009
Preliminary experience using Z to specify a safety-critical system
JC Knight, DM Kienzle
Z User Workshop, London 1992, 109-118, 1993
201993
Security patterns template and tutorial
DM Kienzle, M Elder, D Tyree, J Edwards-Hewitt
2002b. Accessed August, 20, 6, 2002
182002
On-box active reconnaissance
D Kienzle, P Swinton
US Patent 7,934,257, 2011
172011
Some weaknesses of the TCB model
B Blakley, DM Kienzle
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
171997
Security patterns repository
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
162002
Reuse of specifications
JC Knight, DM Kienzle
Proceedings of the 5th Annual Workshop on Software Reuse, 1992
151992
A logic of composition for information flow predicates
RV Peri, WA Wulf, DM Kienzle
Proceedings 9th IEEE Computer Security Foundations Workshop, 82-94, 1996
101996
The minestrone architecture combining static and dynamic analysis techniques for software security
AD Keromytis, SJ Stolfo, J Yang, A Stavrou, A Ghosh, D Engler, M Dacier, ...
2011 First SysSec Workshop, 53-56, 2011
92011
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20