default search action
Pau-Chen Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, James Bottomley:
Intel TDX Demystified: A Top-Down Approach. ACM Comput. Surv. 56(9): 238:1-238:33 (2024) - [c22]Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Christophe de Dinechin, Pau-Chen Cheng, Hani Jamjoom:
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers. CCS 2024: 1390-1404 - [c21]Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma:
DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation. EuroSys 2024: 219-235 - 2023
- [i2]Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, James Bottomley:
Intel TDX Demystified: A Top-Down Approach. CoRR abs/2303.15540 (2023) - 2021
- [c20]Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma:
Separation of Powers in Federated Learning (Poster Paper). ResilientFL 2021: 16-18 - [i1]Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma:
Separation of Powers in Federated Learning. CoRR abs/2105.09400 (2021)
2010 – 2019
- 2019
- [c19]Franck Le, Enriquillo Valdez, Pau-Chen Cheng:
Counting Devices: Revisiting Existing Approaches in Today's Settings. IEEE BigData 2019: 4032-4037 - 2016
- [j6]Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, Pau-Chen Cheng, Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales:
Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM J. Res. Dev. 60(4): 9 (2016) - 2012
- [c18]Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo:
Risk-based security decisions under uncertainty. CODASPY 2012: 157-168 - [c17]Luke Dickens, Ian M. Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo:
Learning Stochastic Models of Information Flow. ICDE 2012: 570-581 - 2011
- [c16]Youngja Park, Stephen C. Gates, Wilfried Teiken, Pau-Chen Cheng:
An experimental study on the measurement of data sensitivity. BADGERS@EuroSys 2011: 70-77 - 2010
- [c15]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. ICETE (Selected Papers) 2010: 158-171 - [c14]Mohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng:
User Centric Policy Management in Online Social Networks. POLICY 2010: 9-13 - [c13]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010: 5-13 - [c12]Mohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng:
Learning based access control in online social networks. WWW 2010: 1179-1180
2000 – 2009
- 2009
- [j5]Howard Chivers, John A. Clark, Pau-Chen Cheng:
Risk profiles and distributed risk assessment. Comput. Secur. 28(7): 521-535 (2009) - 2008
- [c11]Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi:
Policy evolution with Genetic Programming: A comparison of three approaches. IEEE Congress on Evolutionary Computation 2008: 1792-1800 - [c10]Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark:
MLS security policy evolution with genetic programming. GECCO 2008: 1571-1578 - [c9]Ian M. Molloy, Pau-Chen Cheng, Pankaj Rohatgi:
Trading in risk: using markets to improve access control. NSPW 2008: 107-125 - [c8]Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi:
Policy Evolution with Grammatical Evolution. SEAL 2008: 71-80 - 2007
- [j4]Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:
Improving the resilience of content distribution networks to large scale distributed denial of service attacks. Comput. Networks 51(10): 2753-2770 (2007) - [c7]Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. S&P 2007: 222-230 - 2005
- [c6]Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:
Protecting content distribution networks from denial of service attacks. ICC 2005: 830-836 - 2003
- [j3]Suresh Chari, Pau-Chen Cheng:
BlueBoX: A policy-driven, host-based intrusion detection system. ACM Trans. Inf. Syst. Secur. 6(2): 173-200 (2003) - 2002
- [c5]Suresh Chari, Pau-Chen Cheng:
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. NDSS 2002 - 2001
- [j2]Pau-Chen Cheng:
An architecture for the Internet Key Exchange Protocol. IBM Syst. J. 40(3): 721-746 (2001) - 2000
- [c4]Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast. NDSS 2000
1990 – 1999
- 1998
- [j1]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
A Security Architecture for the Internet Protocol. IBM Syst. J. 37(1): 42-60 (1998) - 1995
- [c3]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Securing the Internet (Abstract). PODC 1995: 257 - [c2]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. USENIX Security Symposium 1995 - 1990
- [c1]Pau-Chen Cheng, Virgil D. Gligor:
On the Formal Specification and Verification of a Multiparty Session Protocol. S&P 1990: 216-233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint