Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...
Firewalls have an important role in network security. However, managing firewall policies is an extremely complex task because the large number of interacting rules in single or d...
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...