Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...