Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
This paper uses the persistent object system PCLOS to survey some problems and bene ts of object persistence. The system is analyzed along several relevant dimensions. PCLOS provi...
This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960’s until today’s more elaborate framewo...
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...