Sciweavers

132 search results - page 27 / 27
» Asynchronous policy evaluation and enforcement
Sort
View
JMLR
2006
113views more  JMLR 2006»
14 years 11 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 3 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis