Secure Internet programming
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Neural Fraud Detection in Mobile Phone Operations
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
ICTAI '99 Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Active names: flexible location and transport of wide-area resources
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Secure, customizable, many-to-one communication
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
Formalizing active networks security with seal-calculus
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Hi-index | 0.25 |
Safety and security are two reliability properties of a system. A “safe” system provides protection against errors of trusted users, while a “secure” system protects against errors introduced by untrusted users. There is considerable overlap between mechanisms to support each property. Requirements for rapid service creation have stimulated the development of programmable network infrastructures, where end users or service providers can customize the properties of a network infrastructure while it continues to operate. A central concern of potential users of such systems is their reliability and, most specifically, their safety and security. In this article we explain the impact the network service model and architecture have on safety and security, and provide a model with which policies can be translated into restrictions of a general system. We illustrate these ideas with the Secure Active Network Environment (SANE) architecture, which provides a means of controlling access to the functions provided by any programmable infrastructure