Sciweavers

DISCEX
2003
IEEE
14 years 5 months ago
Surveillance Detection in High Bandwidth Environments
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...
DISCEX
2003
IEEE
14 years 5 months ago
OmniVPN
J. Shukla
DISCEX
2003
IEEE
14 years 5 months ago
Cooperative Response Strategies for Large Scale Attack Mitigation
We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a...
D. Nojiri, Jeff Rowe, Karl N. Levitt
DISCEX
2003
IEEE
14 years 5 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
DISCEX
2003
IEEE
14 years 5 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker
DISCEX
2003
IEEE
14 years 5 months ago
A Summary of the Autonomic Distributed Firewalls (ADF) Project
This paper summarizes the research performed under DARPA’s Autonomic Distributed Firewalls (ADF) research project. The summary begins with a review of the motivation and objecti...
Lynn M. Meredith
DISCEX
2003
IEEE
14 years 5 months ago
A Role-based Trust-management Framework
The RT Role-based Trust-management framework provides policy language, semantics, deduction engine, and pragmatic features such as application domain specification documents that...
Ninghui Li, John C. Mitchell
DISCEX
2003
IEEE
14 years 5 months ago
Lessons Learned in Using Live Red Teams in IA Experiments
The DARPA Information Assurance (IA) and Operational Partners in Experimentation (OPX) Programs have conducted over a dozen laboratory-based experiments involving live red teams s...
David Levin
DISCEX
2003
IEEE
14 years 5 months ago
Design and Analysis of an IP-Layer Anonymizing Infrastructure
This paper describes an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, A...
H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott Br...
DISCEX
2003
IEEE
14 years 5 months ago
Towards a Rigorous Definition of Information System Survivability
The computer systems that provide the information underpinnings for critical infrastructure applications, both military and civilian, are essential to the operation of those appli...
John C. Knight, Elisabeth A. Strunk, Kevin J. Sull...