The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in comput...
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...