Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
Today's business climate requires to constantly evolve IT strategies for responding to new opportunities or threats. While the fundamentals of IT -- reliability, availability,...
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
This paper presents a novel approach that simplifies real-time multimedia communication applications development and service provision. Such applications are no longer required to...
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...