ACSAC
14 years 1 months ago
2004 IEEE ACSAC
14 years 1 months ago
2004 IEEE
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
ACSAC
14 years 1 months ago
2004 IEEE
The basic idea behind delegation is that some active entity in a system delegates authority to another active entity in order to carry out some functions on behalf of the former. ...
ACSAC
14 years 1 months ago
2004 IEEE
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
ACSAC
14 years 1 months ago
2004 IEEE
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
|