default search action
Xiaolan Zhang 0001
Person information
- affiliation: IBM Thomas J. Watson Research Center, Hawthorne, NY, USA
- affiliation (former): Harvard University, Cambridge, MA, USA
Other persons with the same name
- Xiaolan Zhang — disambiguation page
- Xiaolan Zhang 0002 — Northeastern University, College of Computer Science, Boston, MA, USA
- Xiaolan Zhang 0003 (aka: Xiaolan (Ellen) Zhang) — Fordham University, Bronx, NY, USA (and 1 more)
- Catherine Zhang 0002 — Cornell University, Ithaca, NY, USA
- Catherine Zhang 0003 — Icahn School of Medicine at Mount Sinai, New York, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2011
- [j4]Kyung Dong Ryu, Xiaolan (Catherine) Zhang:
Preface: Cloud Computing. IBM J. Res. Dev. 55(6): 0 (2011) - 2004
- [j3]Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) - 2003
- [j2]Trent Jaeger, Xiaolan Zhang, Antony Edwards:
Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) - 2001
- [j1]Xiaolan Zhang, Margo I. Seltzer:
HBench: Java: An application-specific benchmarking framework for Java Virtual Machines. Concurr. Comput. Pract. Exp. 13(8-9): 775-792 (2001)
Conference and Workshop Papers
- 2014
- [c34]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
SEER: practical memory virus scanning as a service. ACSAC 2014: 186-195 - [c33]Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang, Niyu Ge, Vasanth Bala, Tianyin Xu, Yuanyuan Zhou:
EnCore: exploiting system environment and correlation information for misconfiguration detection. ASPLOS 2014: 687-700 - [c32]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
DACSA: A Decoupled Architecture for Cloud Security Analysis. CSET 2014 - 2013
- [c31]Xianzhi Wang, Xuejun Zhuo, Bo Yang, Fan Jing Meng, Pu Jin, Woody Huang, Christopher C. Young, Catherine Zhang, Jing Min Xu, Michael Montinarelli:
A Novel Service Composition Approach for Application Migration to Cloud. ICSOC 2013: 667-674 - [c30]Kun Bai, Niyu Ge, Hani Jamjoom, Ea-Ee Jan, Lakshminarayanan Renganarayana, Xiaolan Zhang:
What to discover before migrating to the cloud. IM 2013: 320-327 - [c29]Ea-Ee Jan, Jian Ni, Niyu Ge, Naga Ayachitula, Xiaolan Zhang:
A statistical machine learning approach for ticket mining in IT service delivery. IM 2013: 541-546 - 2012
- [c28]Jason Gionta, Peng Ning, Xiaolan Zhang:
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. ACNS 2012: 381-399 - 2011
- [c27]Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. CCS 2011: 375-388 - 2010
- [c26]Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, Vasanth Bala:
Always up-to-date: scalable offline patching of VM images in a compute cloud. ACSAC 2010: 377-386 - [c25]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. CCS 2010: 38-49 - [c24]Kyung Dong Ryu, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Stefan Berger, Dilma M. Da Silva, Jim Doran, Frank Franco, Alexei A. Karve, Herb Lee, James A. Lindeman, Ajay Mohindra, Bob Oesterlin, Giovanni Pacifici, Dimitrios E. Pendarakis, Darrell Reimer, Mariusz Sabath:
RC2 - A Living Lab for Cloud Computing. LISA 2010 - 2009
- [c23]Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang:
HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470 - [c22]Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning:
Managing security of virtual machine images in a cloud environment. CCSW 2009: 91-96 - [c21]Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124 - 2008
- [c20]Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang:
Trustworthy and personalized computing on public kiosks. MobiSys 2008: 199-210 - [c19]Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou:
AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 - 2007
- [c18]Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang:
Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 - [c17]Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin:
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. Middleware 2007: 184-203 - [c16]Scott Garriss, Romó Sailer, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang:
Towards Trustworthy Kiosk Computing. HotMobile 2007: 41-45 - 2006
- [c15]Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng:
The case for analysis preserving language transformation. ISSTA 2006: 191-202 - [c14]Trent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang:
Leveraging IPsec for Mandatory Per-Packet Access Control. SecureComm 2006: 1-9 - 2004
- [c13]Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn:
Attestation-based policy enforcement for remote access. CCS 2004: 308-317 - [c12]Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Resolving constraint conflicts. SACMAT 2004: 105-114 - [c11]Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238 - 2003
- [c10]Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Analyzing Integrity Protection in the SELinux Example Policy. USENIX Security Symposium 2003 - 2002
- [c9]Antony Edwards, Trent Jaeger, Xiaolan Zhang:
Runtime verification of authorization hook placement for the linux security modules framework. CCS 2002: 225-234 - [c8]Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Managing access control policies using access control spaces. SACMAT 2002: 3-12 - [c7]Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204 - [c6]Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer:
Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242 - [c5]Xiaolan Zhang, Antony Edwards, Trent Jaeger:
Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48 - 2001
- [c4]Xiaolan Zhang, Margo I. Seltzer:
HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance. COOTS 2001: 47-60 - 2000
- [c3]Xiaolan Zhang, Margo I. Seltzer:
HBench: Java: an application-specific benchmarking framework for Java virtual machines. Java Grande 2000: 62-70 - 1999
- [c2]Margo I. Seltzer, David Krinsky, Keith A. Smith, Xiaolan Zhang:
The Case for Application-Specific Benchmarking. Workshop on Hot Topics in Operating Systems 1999: 102-109 - 1997
- [c1]Xiaolan Zhang, Zheng Wang, Nicholas C. Gloy, J. Bradley Chen, Michael D. Smith:
System Support for Automated Profiling and Optimization. SOSP 1997: 15-26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint