Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
In this paper we outline the architecture of a peer-to-peer Trust Layer that can be superimposed to metadata generators producing classifications, like our ClassBuilder and BTExac...
A module has been implemented in Field Programmable Gate Array (FPGA) hardware that scans the content of Internet packets at Gigabit/second rates. All of the packet processing ope...
James Moscola, John W. Lockwood, Ronald Prescott L...
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...