vTPM: virtualizing the trusted platform module R Perez, R Sailer, L van Doorn Proc. 15th Conf. on USENIX Security Symposium, 305-320, 2006 | 827 | 2006 |
Building a MAC-based security architecture for the Xen open-source hypervisor R Sailer, T Jaeger, E Valdez, R Caceres, R Perez, S Berger, JL Griffin, ... 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-285, 2005 | 427 | 2005 |
Building the IBM 4758 secure coprocessor JG Dyer, M Lindemann, R Perez, R Sailer, L Van Doorn, SW Smith Computer 34 (10), 57-66, 2001 | 402 | 2001 |
Framework for security and privacy in automotive telematics S Duri, M Gruteser, X Liu, P Moskowitz, R Perez, M Singh, JM Tang Proceedings of the 2nd international workshop on Mobile commerce, 25-32, 2002 | 240 | 2002 |
TVDc: managing security in the trusted virtual datacenter S Berger, R Cáceres, D Pendarakis, R Sailer, E Valdez, R Perez, ... ACM SIGOPS Operating Systems Review 42 (1), 40-47, 2008 | 221 | 2008 |
sHype: Secure hypervisor approach to trusted virtualized systems R Sailer, E Valdez, T Jaeger, R Perez, L Van Doorn, JL Griffin, S Berger, ... Techn. Rep. RC23511 5, 2005 | 219 | 2005 |
Linking remote attestation to secure tunnel endpoints K Goldman, R Perez, R Sailer Proceedings of the first ACM workshop on Scalable trusted computing, 21-24, 2006 | 149 | 2006 |
Secure coprocessor-based intrusion detection X Zhang, L Van Doorn, T Jaeger, R Perez, R Sailer Proceedings of the 10th workshop on ACM SIGOPS European workshop, 239-242, 2002 | 140 | 2002 |
Trusted virtual domains: Toward secure distributed services JL Griffin, T Jaeger, R Perez, R Sailer, L Van Doorn, R Caceres Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability …, 2005 | 125 | 2005 |
Security for the cloud infrastructure: Trusted virtual data center implementation S Berger, R Cáceres, K Goldman, D Pendarakis, R Perez, JR Rao, E Rom, ... IBM Journal of Research and Development 53 (4), 6: 1-6: 12, 2009 | 100 | 2009 |
Secure system and method for enforcement of privacy policy and protection of confidentiality SS Duri, X Liu, PA Moskowitz, R Perez, EG Schonberg, M Singh, ... US Patent 7,353,532, 2008 | 96 | 2008 |
Computer workload management with security policy enforcement SA Bade, AG Kegel, R Perez, BD You US Patent 8,707,383, 2014 | 93 | 2014 |
Secure system and method for enforcement of privacy policy and protection of confidentiality SS Duri, MO Gruteser, X Liu, PA Moskowitz, R Perez, EG Schonberg, ... US Patent 7,401,352, 2008 | 83 | 2008 |
Deriving security and privacy solutions to mitigate risk L Betz, G Blakley, D Cronin, D Hemsath, P Landsberg, C O'Connor, ... US Patent App. 10/683,022, 2005 | 82 | 2005 |
Validating a high-performance, programmable secure coprocessor SW Smith, R Perez, S Weingart, V Austel IBM Thomas J. Watson Research Division, 1999 | 82 | 1999 |
Virtualization and hardware-based security R Perez, L Van Doorn, R Sailer IEEE Security & Privacy 6 (5), 24-31, 2008 | 81 | 2008 |
Data management system and method FM Lacan, R Perez, MI Shub, CP Tresser US Patent 7,370,366, 2008 | 73 | 2008 |
Watchdog for trusted electronic content distributions RA Flavin, P Nihal, R Perez, SW Smith US Patent 6,219,788, 2001 | 70 | 2001 |
Cryptographic protection of information in a processing system DA Kaplan, TR Woller, R Perez US Patent 9,792,448, 2017 | 67 | 2017 |
Data protection and data sharing in telematics S Duri, J Elliott, M Gruteser, X Liu, P Moskowitz, R Perez, M Singh, ... Mobile networks and applications 9, 693-701, 2004 | 61 | 2004 |