The SwitchWare Project
Active Network Research at Penn and Bellcore
Active networks explore the idea of allowing routing elements
to be extensively programmed by the packets passing through them. This
allows computation previously possible only at endpoints to be carried
out within the network itself, thus enabling optimizations and extensions
of current protocols as well as the development of fundamentally new protocols.
Welcome to the SwitchWare home page, describing the Active Networks research
effort underway in the Penn Department
of Computer and Information Science and Bellcore
as well as pointers to related material.
Google Apps offers a SAML-based Single Sign-On (SSO) service that provides partner companies with control over authorization and authentication of hosted user accounts to access web-based applications like Gmail or Google Calendar
appliances provide the essential foundation for identity-driven networks (IDNs), delivering reliable, scalable, and secure network identity services including DNS, DHCP, IPAM, and RADIUS.
Q: What is myNetWatchman?
A: myNetWatchman collects, analyzes and reports malicious
access attempts to ISPs, who can then take action against
the offending machines.
[Back to top]
Q: How does it work?
A: A small client-side application runs as a background
application on your system; reading your firewall logs, and
creating near-real-time reports that are relayed to the myNetwatchman
servers for analysis.
[Back to top]
ISO27k standards provide generally accepted good practice guidance on Information Security Management Systems to protect the confidentiality, integrity and availability of the information content and information systems
Stamp says that business units must accept responsibility for the security of the data they generate and control to head off
data leaks. "IT people are data custodians, not owners," Stamp says. "We need to transfer responsibility to business people
Through DRM technologies, consumers engaging in electronic commerce could grant vendors and suppliers a license to access
and utilize certain aspects of the consumers’ data. This would enable a consumer to grant a read/write license to some creditors,
perhaps as a function of a mortgage agreement, and provide a read-only license to a limited subset of the data for simple
transactions such as shipping agreements and online orders. Such a license would empower consumers to prevent entities from
misusing or reselling consumer information.
Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs