In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Component-based software development (CBSD) offers many advantages like reduced product time to market, reduced complexity and cost etc. Despite these advantages its wide scale ut...
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...