New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...