The following publications are possibly variants of this publication:
- Runtime verification of authorization hook placement for the linux security modules frameworkAntony Edwards, Trent Jaeger, Xiaolan Zhang. ccs 2002: 225-234 [doi]
- Consistency analysis of authorization hook placement in the Linux security modules frameworkTrent Jaeger, Antony Edwards, Xiaolan Zhang. tissec, 7(2):175-205, 2004. [doi]
- Using CQUAL for Static Analysis of Authorization Hook PlacementXiaolan Zhang, Antony Edwards, Trent Jaeger. uss 2002: 33-48 [doi]
- Maintaining Authorization Hook Placements Across Program VersionsNirupama Talele, Divya Muthukumaran, Frank Capobianco, Trent Jaeger, Gang Tan. secdev 2016: 67-68 [doi]
- Leveraging "choice" to automate authorization hook placementDivya Muthukumaran, Trent Jaeger, Vinod Ganapathy. ccs 2012: 145-156 [doi]