: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooï...
The trend of the networking processing is to increase the intelligence of the routers (i.e. security capacities). This means that there is an increment in the workload generated p...
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...