This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
A framework is described that can be used to build and test application-level software for wireless mobile computing. It emulates the physical mobility of wireless devices by usin...
The online discussion forum is the main mode of interaction for Web-based learning. Existing online instructional management systems contain primitive discussion tools that do lit...
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...