Joseph Betser

Learn More
Device failures, performance ineeciencies, and security compromises are some of the problems associated with the operations of networked systems. EEective management requires monitoring, interpreting, and controlling the behavior of the distributed resources. Current management systems pursue a platform-centered paradigm, where agents monitor the system and(More)
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. We then describe the design and implementation of IAP, the first attempt at such a protocol. After a discussion of IAP's limitations, we discuss BEEP, a new IETF general framework for(More)
—In the Android operating system, each application consists of a set of components that communicate with each other via messages called Intents. The current implementation of Intent handling is such that developers can inadvertently write insecure code that allows malicious applications to intercept or inject Intents to steal sensitive information or induce(More)
You are cordially invited to join us at the 10 th IEEE/IFIP International Symposium on Network Operations and Management (NOMS 2006), sponsored by the IEEE Communications Society and IFIP Working Group 6.6, and enjoy the premier conference in our profession. The evolution of a worldwide information infrastructure based on the Internet is leading to(More)
— This paper describes the process of grid-enabling a vibroacoustic analysis application using the Globus Toolkit 3.2.1. This is the first step in a project intended to grid-enable a suite of tools being developed as a service-oriented architecture for spacecraft telemetry analysis. Many of the applications in the suite are compute intensive and would(More)