Learn More
Transport Layer Security (TLS) and its precursor Secure Sockets Layer (SSL) are the most widely deployed protocol to establish secure communication over insecure Internet Protocol (IP) networks. Providing a secure session layer on top of TCP, TLS is frequently the first defense layer encountered by adversaries who try to cause loss of confidentiality by(More)
In a distributed information system, Quality of Service (QoS) and Information Assurance (IA) compete for the same set of resources. This tension increases in the presence of cyber attacks. Previous work formulated the problem of trading off QoS against IA as a DCOP whose solution sets the local configuration at individual decision-making nodes to optimize(More)
In a distributed information system, Quality of Service (QoS) and Information Assurance (IA) compete for the same set of resources. This tension increases in the presence of cyber attacks. Previous work formulated the problem of trading off QoS against IA as a DCOP whose solution sets the local configuration at individual decision-making nodes to optimize(More)
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spite of the differences in resource availability, threat models, vulnerabilities, information formats,(More)
  • 1