Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Security in Computing
IEEE Security and Privacy
Persistent information security: beyond the e-commerce threat model
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Usage control enforcement - a survey
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Hi-index | 0.00 |
A file level information security technology that applies everywhere, every time, is introduced. The security is always 'on', as much 'in the wild' as behind the firewall or in the VPN tunnel. The broad strokes of structure and operation are discussed in terms of a specific system, RightsEnforcer. The technology is currently being deployed in the Adaptive Risk Management Lab at the University of New Brunswick as part of a testbed supporting emergency response operations.