A
Alain Jules Mayer
Researcher at Alcatel-Lucent
Publications - 32
Citations - 3760
Alain Jules Mayer is an academic researcher from Alcatel-Lucent. The author has contributed to research in topics: Firewall (construction) & Application firewall. The author has an hindex of 22, co-authored 32 publications receiving 3730 citations.
Papers
More filters
Proceedings Article
The design and analysis of graphical passwords
TL;DR: This work proposes and evaluates new graphical password schemes that exploit features of graphical input displays to achieve better security than text-based passwords and describes the prototype implementation of one of the schemes on a personal digital assistants (PDAs) namely the Palm PilotTM.
Patent
System and method for providing anonymous personalized browsing by a proxy system in a network
TL;DR: In this paper, a central proxy system includes computer-executable routines that process site-specific substitute identifiers constructed from data specific to the users, that transmits the substitute identifiers to the server sites, that retransmits browsing commands received from the users to the user sites, and that removes portions of the browsing commands that would identify the users.
Journal ArticleDOI
Firmato: A novel firewall management toolkit
TL;DR: This paper presents Firmato, a firewall management toolkit, with the following distinguishing properties and components: an entity-relationship model containing, in a unified form, global knowledge of the security policy and of the network topology.
Book ChapterDOI
How to Make Personalized Web Browising Simple, Secure, and Anonymous
TL;DR: An increasing number of web-sites require users to establish an account before they can access the information stored on that site (“personalized web browsing”) and additional information about the user may flow from the user's site to the web-site, due to the nature of the HTTP protocol and the cookie mechanism.
Patent
Method and apparatus for network wide policy-based analysis of configurations of devices
TL;DR: In this article, the authors present a method and an apparatus for analyzing a network configuration against a corporate network policy and determining violation(s) against the corporate network policies and adding an entry to its final report each time that it detects a violation against the network policy in the network configuration model.