The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...