This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...