John Michener

Greater Seattle Area
Computer & Network Security

Join LinkedIn and access John's full profile. It's free!

As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.

  • See who you know in common
  • Get introduced
  • Contact John directly



Understanding and Setting File and Registry Permissions in Modern Microsoft Operating Systems: Windows Server 2008 and Windows Vista

Microsoft MSDN
November 2008

Understanding and Setting File and Registry Permissions in Modern Microsoft Operating Systems: Windows Server 2008 and Windows Vista

IEEE Security and Privacy
May 2008

Snake-Oil Security Claims, The Systematic Misrepresentation of Product Security in the e-Commerce Arena

Michigan Telecommunications and Technology Law Review
April 2003

Risks in Features vs. Assurance

Communications of the ACM

Shrinking Holes in Corporate Data Dikes

IEEE IT Professional
January 2002

Clothing the e-Emperor

IEEE Computer
September 2001

Security Domains: Key Management in Large Scale Systems

IEEE Software
September 2000

Managing System and Active Content Integrity

IEEE Computer
July 2000

System Insecurity in the Internet Age

IEEE Software
July 1999

Integrity of Advanced Authentication Technologies: Biometrics, Smartcards, and Client Protocols

Cardtech/Securtech Conference
April 1998

Electronic Commerce and Security on the Internet

Online Conference
October 1996

Defending Against User-level Information Exfiltration(Link)

IEEE IT Professional
December 2011

Conventional security precautions are no longer adequate to protect users and organizations in the current environment. In the past decade the internet has both come to play a critical role for both individuals and organizations as well as become far more dangerous. Users, in both their home and work environments, mix activities on the internet (browsing, e-mail, social networking) with other activities. This mixing of activities with different security contexts greatly increases users risk exposure. Fortunately, operating system security has increased significantly over the past decade and it is now significantly easier to compromise applications than it is to compromise the operating system. Unfortunately, while compromising the operating system is a more valuable exploitation, most of the value of an exploit can be obtained from user level compromises. Since modern operating systems currently have limited capabilities for managing information flow within the context of a user, compromise of a user allows relatively straightforward exfiltration of data that the user had access to. Unfortunately, such attacks are now widespread (this attack approach is included under the Advanced Persistent Threat exploitations).


Electrophotosensitive Migration Imaging Apparatus and Method

United States 4,125,322
Issued 1978

High-Speed Voltage Sensitive Circuit Breaker

United States 4,603,366
Issued 1986

Method and Apparatus for Securing Access to a Computer Facility

United States 4,802,217
Issued 1989

Electron Storage Source for Electron Beam Testers

United States 4,861,991
Issued 1989

System Method and Apparatus For Authenticating an Encrypted Signal

United States 5,351,293
Issued 1994

Encrypted Data Package Record for Use in Remote Transaction Metered Data System

United States 5,615,264
Issued 1997

Secure Communication System with Cross Linked Cryptographic Codes,

United States 5,671,283
Issued 1997

Trusted Authorization Device

United States 7,028,191
Issued 2006

Constraining a login to a subset of access rights

United States unknown
Filed 2009

Secondary Credentials for Batch System

United States unknown
Filed September 2010

View John's full profile to...

  • See who you know in common
  • Get introduced
  • Contact John directly

Not the John Michener you're looking for? View more


People Also Viewed

LinkedIn member directory - Browse members by country

  1. a
  2. b
  3. c
  4. d
  5. e
  6. f
  7. g
  8. h
  9. i
  10. j
  11. k
  12. l
  13. m
  14. n
  15. o
  16. p
  17. q
  18. r
  19. s
  20. t
  21. u
  22. v
  23. w
  24. x
  25. y
  26. z
  27. more