SYSTEM AND METHOD FOR MANAGING CONFIDENTIAL DATA

Ronald PEREZ , Michael SHUB , Charles TRESSER , Francis LACAN

2003
DES hardware throughput for short operations

Ronald Perez , Sean William Smith , Mark Lindemann

4
2008
vTPM: virtualizing the trusted platform module

Ronald Perez , Reiner Sailer , Leendert van Doorn ,
usenix security symposium 21

547
2006
Trusted virtual domains: toward secure distributed services

Reiner Sailer , John Linwood Griffin , Ronald Perez , Ramón Cáceres
hot topics in system dependability 4 -4

83
2005
Method, system, and program product for remotely attesting to a state of a computer system

Stefan Berger , Reiner Sailer , Kenneth Goldman , Ronald Perez

36
2016
Data protection and data sharing in telematics

Sastry Duri , Jeffrey Elliott , Marco Gruteser , Xuan Liu
Mobile Networks and Applications 9 ( 6) 693 -701

36
2004
TVDc: managing security in the trusted virtual datacenter

Stefan Berger , Ramón Cáceres , Dimitrios Pendarakis , Reiner Sailer
Operating Systems Review 42 ( 1) 40 -47

139
2008
Silicon systems security and building a root of trust

Ronald Perez
2015 IEEE Asian Solid-State Circuits Conference (A-SSCC) 1 -4

2015
Special Section on Secure Computer Architectures

Patrick Schaumont , Ruby Lee , Ronald Perez , Guido Bertoni
IEEE Transactions on Computers 67 ( 3) 305 -306

2018
Linking remote attestation to secure tunnel endpoints

Kenneth Goldman , Ronald Perez , Reiner Sailer
Proceedings of the first ACM workshop on Scalable trusted computing - STC '06 21 -24

110
2006
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control

Enriquillo Valdez , Reiner Sailer , Ronald Perez
annual computer security applications conference 221 -231

20
2007
Virtualization and Hardware-Based Security

Ronald Perez , Leendert van Doorn , Reiner Sailer
ieee symposium on security and privacy 6 ( 5) 24 -31

50
2008
Secure coprocessor-based intrusion detection

Xiaolan Zhang , Leendert van Doorn , Trent Jaeger , Ronald Perez
Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10 239 -242

97
2002
Framework for security and privacy in automotive telematics

Sastry Duri , Marco Gruteser , Xuan Liu , Paul Moskowitz
Proceedings of the 2nd international workshop on Mobile commerce - WMC '02 25 -32

168
2002
Method of managing and mitigating security risks through planning

Kay S Anderson , Pau-Chen Cheng , Mark D Feblowitz , Genady Grabarnik

14
2010
Method of managing and mitigating security risks through planning

Kay S Anderson , Pau-Chen Cheng , Mark D Feblowitz , Genady Grabarnik

2
2012
Method and apparatus for scalable integrity attestation in virtualization environments

Stefan Berger , Ramon Caceres , Kenneth Alan Goldman , Ronald Perez

6
2013
sHype: Mandatory Access Control For XEN

Reiner Sailer , Trent Jaeger , Enriquillo Valdez , Ramon Caceres

2
System and method for fuzzy multi-level security

Pau-Chen Cheng , Shai Halevi , Trent Ray Jaeger , Paul Ashley Karger

40
2009
Fuzzy multi-level security

Pau-Chen Cheng , Shai Halevi , Trent Ray Jaeger , Paul Ashley Karger

22
2011