T Ryutov, L Zhou, C Neuman, T Leithead… - Proceedings of the …, 2005 - dl.acm.org
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access …
With the increasing frequency and sophistication of network attacks, network administrators are facing tremendous challenges in making fast and optimum decisions during critical …
PB Patrick, N Gupta - US Patent 8,086,615, 2011 - Google Patents
5,481,700 A 1/1996 Thuraisingham 5,544,355 A 8, 1996 Chaudhuri et al. 5,701,453 A 12/1997 Maloney et al. 5,764,973 A 6, 1998 Lunceford 5,797,128 A 8, 1998 Birnbaum …
M Moriconi, S Qian - US Patent 7,506,357, 2009 - Google Patents
See application file for complete search histo s on a server for managing and distributing a security policy, pp p ry. and an application guard located on a client for managing (56) …
Incident handling, consisting of intrusion detection, alert processing and intrusion response, increases the resilience of IT systems under attack. Instead of providing a holistic solution …
T Ryutov, L Zhou, C Neuman, N Foukia… - The 6th IEEE/ACM …, 2005 - ieeexplore.ieee.org
Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users and …
N Gupta - US Patent 7,778,998, 2010 - Google Patents
5,544,355 A* 8/1996 Chaudhuri et al.............. 707/2 5,701,453 A 12/1997 Maloney et al. 5,764,973 A 6, 1998 Lunceford 5,802,518 A 9, 1998 Karaev et al. 5,940,289 A 8, 1999 Iwata …
In recent years, cost-sensitive intrusion response has gained significant interest due to its emphasis on the balance between potential damage incurred by the intrusion and cost of …