Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...