Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...