Export (9) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Jamkhedkar  [Clear All Filters]
Conference Paper
Szefer, J., Jamkhedkar, P., Perez-Botero, D., Lee, R.B., "Cyber Defenses for Physical Attacks and Insider Threats in Cloud", Proceedings of the ACM Symposium on Information, Computer and Communications Security (AsiaCCS), June 2014. Tagged XML BibTex
Jamkhedkar, P., Szefer, J., Perez-Botero, D., Zhang, T., Triolo, G., Lee, Ruby.B., "A Framework for Realizing Security on Demand in Cloud Computing", IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK, December 2013. Tagged XML BibTex
Chen, Y., Jamkhedkar, P.A., Lee, R.B., "A Software-Hardware Architecture for Self-Protecting Data", 19th ACM conference on Computer and Communications Security, Raleigh, NC, USA, October 16-18. Abstract Tagged XML BibTex
Szefer, J., Jamkhedkar, P., Chen, Y., Lee, R.B., "Physical Attack Protection with Human-Secure Virtualization in Data Centers", Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS), June 25, 2012. Tagged XML BibTex
Lamb, C.C., Jamkhedkar, P.A., Bonsack, M., Nandina, V., Heileman, G.L., "A Domain Specific Language for Usage Management", in Proceedings of the Eleventh ACM Workshop on Digital Rights Management, October 21, 2011. Tagged XML BibTex
Lamb, C.C., Jamkhedkar, P.A., Heileman, G.L., T.Abdallah, C., "Managed Control of Composite Cloud Systems", in Proceedings of International Conference on System of Systems Engineering (SOSE), June 27-30, 2011. Tagged XML BibTex
Heileman, M.D., Gilger, M., Heileman, G.L., Jamkhedkar, P.A., Shaver, M.P., "SMASHUP: secure mashup for defense transformation and net-centric systems", in Proceedings of Defense Transformation and Net-Centric Systems, April 27, 2011. Tagged XML BibTex
Jamkhedkar, P.A., Lamb, C.C., Heileman, G.L., "Usage Management in Cloud Computing", in Proceedings of the International Conference on Cloud Computing (IEEE Cloud), July 4-9, 2011. Tagged XML BibTex
Journal Article
Chen, Y., Jamkhedkar, P., Lee, R.B., "Running Untrusted Applications on Sensitive Data", Princeton University Department of Electrical Engineering Technical Report CE-L2011-007, Nov. 16, 2011. Tagged XML BibTex