Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it bec...
Martin Suchara, Ioannis C. Avramopoulos, Jennifer ...
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...