In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing Traffic Engineering (TE) policies in a multiaddressed I...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...