Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...