P
Pau-Chen Cheng
Researcher at IBM
Publications - 37
Citations - 2967
Pau-Chen Cheng is an academic researcher from IBM. The author has contributed to research in topics: Access control & Internet Protocol. The author has an hindex of 20, co-authored 36 publications receiving 2922 citations.
Papers
More filters
Journal ArticleDOI
A security architecture for the Internet protocol
TL;DR: The design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer, which includes a modular key management protocol, called MKMP, is presented.
Proceedings ArticleDOI
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
TL;DR: A new model for adaptive, risk-based access control is presented, more like a fuzzy logic control system than a traditional access control system and hence the name "fuzzy MLS".
Journal ArticleDOI
The Jikes research virtual machine project: building an open-source research community
Bowen Alpern,S. Augart,Stephen M. Blackburn,Maria Angela Butrico,A. Cocchi,Pau-Chen Cheng,Julian Dolby,Stephen J. Fink,David Grove,Michael Hind,Kathryn S. McKinley,Mark F. Mergen,J. E. B. Moss,Ton Ngo,Vivek Sarkar +14 more
TL;DR: This paper describes the evolution of the JikesTM Research Virtual Machine project from an IBM internal research project, called Jalapeno, into an open-source project.
The Jikes Research Virtual Machine project: Building an open-source research
Bowen Alpern,S. Augart,Stephen M. Blackburn,Maria Angela Butrico,Anthony Cocchi,Pau-Chen Cheng,Julian Dolby,Stephen J. Fink,David Grove,Michael Hind,Kathryn S. McKinley,Mark F. Mergen,J. E. B. Moss,Ton Ngo,Vivek Sarkar,M. Trapp +15 more
TL;DR: The JikesTM Research Virtual Machine project as discussed by the authors is an open source project that was originally developed as an IBM internal research project, called Jalapeno, and was later released as an open-source project.
Patent
Intrusion detection system
TL;DR: In this paper, an intrusion detection system (IDS) is used to protect computers against intrusions and program product therefor, the IDS determines which applications are to run in native environment (NE) and places the remaining applications in a sandbox.