Now showing items 1-2 of 2
Trusted data path protecting shared data in virtualized distributed systems
(Georgia Institute of Technology, 2010-01-20)
When sharing data across multiple sites, service applications should not be trusted automatically. Services that are suspected of faulty, erroneous, or malicious behaviors, or that run on systems that may be compromised, ...
Flexible access control for campus and enterprise networks
(Georgia Institute of Technology, 2010-04-07)
We consider the problem of designing enterprise network security systems which are easy to manage, robust and ﬂexible. This problem is challenging. Today, most approaches rely on host security, middleboxes, and complex ...