A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...