Sandra Julieta Rueda
Sandra Julieta Rueda
Bestätigte E-Mail-Adresse bei uniandes.edu.co - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A logical specification and analysis for SELinux MLS policy
B Hicks, S Rueda, L St. Clair, T Jaeger, P McDaniel
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
1022010
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
B Hicks, SJ Rueda, T Jaeger, PD McDaniel
USENIX Annual Technical Conference 7, 34, 2007
552007
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
522012
FlowFence: a denial of service defense system for software defined networking
AFM Piedrahita, S Rueda, DMF Mattos, OCMB Duarte
2015 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2015
382015
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
332010
Extending the floodlight controller
LV Morales, AF Murillo, SJ Rueda
2015 IEEE 14th International Symposium on Network Computing and Applications …, 2015
302015
Leveraging software-defined networking for incident response in industrial control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
IEEE Software 35 (1), 44-50, 2017
252017
Verifying Compliance of Trusted Programs.
SJ Rueda, D King, T Jaeger
USENIX Security Symposium, 321-334, 2008
192008
Virtual incident response functions in control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
Computer Networks 135, 147-159, 2018
182018
Flexible security configuration for virtual machines
S Rueda, Y Sreenivasan, T Jaeger
Proceedings of the 2nd ACM workshop on Computer security architectures, 35-44, 2008
162008
Sexual intimacy in the age of smart devices: Are we practicing safe IoT?
M Wynn, K Tillotson, R Kao, A Calderon, A Murillo, J Camargo, R Mantilla, ...
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017
152017
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
152009
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
132012
Integrating SELinux with security-typed languages
B Hicks, S Rueda, T Jaeger, P McDaniel
Proceedings of the 3rd SELinux Symposium, 2007
132007
Protecting users from" themselves"
W Enck, S Rueda, J Schiffman, Y Sreenivasan, L St. Clair, T Jaeger, ...
Proceedings of the 2007 ACM workshop on Computer security architecture, 29-36, 2007
92007
Meaningful permission management in android
LV Morales, SJ Rueda
IEEE Latin America Transactions 13 (4), 1160-1166, 2015
72015
Cut me some security
D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010
72010
Androidblp for confidentiality management in android environments
JL Corchuelo, SJ Rueda
IEEE Latin America Transactions 15 (3), 496-502, 2017
52017
Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec
B Hicks, S Rueda, T Jaeger, P McDaniel
Technical Report NAS-TR-0049-2006, Network and Security Research Center …, 2006
52006
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora, M Linares-Vásquez, S Rueda, ...
Empirical Software Engineering 24 (4), 2056-2101, 2019
42019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20