• United States
IBM®
  • Site map

IBM Research
  • Research Areas
    • Hybrid Cloud
    • AI
    • Quantum
    • Science
  • Labs
    • IBM Research-Africa
    • IBM Research-Almaden
    • IBM Research-Austin
    • IBM Research-Australia
    • IBM Research-Brazil
    • IBM Research-China
    • IBM Research Europe
    • IBM Research-Haifa
    • IBM Research-India
    • IBM Research-Tokyo
    • Thomas J Watson Research Center
  • Disciplines
  • Blog

Security Research     

links

  • Overview
  • Members
  • Past Projects
  • Selected Publications
  • Collaborators
  • News

Security Research - Past Projects


  • Bluebox:Policy-Driven Intrusion Avoidance System
  • Caernarvon: A Secure, High Assurance Operating System for Smart Cards
  • E-Check
  • Feedback-Driven Automated Security Testing
  • Hypervisor Security Architecture (sHype)
  • Identity 2.0
  • Integrated Security Context Management
  • Integrity Measurement Architecture (IMA)
  • IPSec and IKE
  • Language-based Security: Java, PHP
  • Linux for the 4758 Secure Coprocessor
  • Linux Security Analysis Tools (VALI)
  • Matchbox
  • Pseudonymity
  • Secure Co-Processors
  • Secure Identity Tokens
  • Secure DNS
  • Secure Internet Multicast
  • Security for Pervasive Computing Applications
  • Security for SOA infrastructure
  • Security for a Software as a Service architecture
  • Security for System S & FuzzyMLS
  • Security Services in Virtualized Environments
  • Sentry: Tivoli Compliance and Remediation
  • Side-channel Cryptanalysis
  • Trojan detection in Integrated Cicuits
  • Trusted Virtual Data Center (TVDc)
  • Trusted Virtual Domains (TVD)
  • Virtual Trusted Platform Module (vTPM)
  • Web 2.0