Sciweavers

132 search results - page 27 / 27
» Asynchronous policy evaluation and enforcement
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 4 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 8 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis