P
Pau-Chen Cheng
Researcher at IBM
Publications - 37
Citations - 2967
Pau-Chen Cheng is an academic researcher from IBM. The author has contributed to research in topics: Access control & Internet Protocol. The author has an hindex of 20, co-authored 36 publications receiving 2922 citations.
Papers
More filters
Patent
Network data collection and response system
Suresh Chari,Pau-Chen Cheng,Xin Hu,Lawrence Koved,Josyula R. Rao,Reiner Sailer,Douglas Lee Schales,Kapil Singh,Marc Ph. Stoecklin +8 more
TL;DR: In this article, the authors propose a network data collection and response system for enhancing security in an enterprise network providing a user-supplied computing device with access to the network, which is based on the idea of passive monitoring without utilization of a data monitoring agent installed on the device.
Proceedings Article
An IPSec-based Host Architecture for Secure Internet Multicast.
Ran Canetti,Pau-Chen Cheng,Frederique A. Giraud,Dimitrios Pendarakis,Josyula R. Rao,Pankaj Rohatgi,Debanjan Saha +6 more
TL;DR: This work identifies the basic components of the architecture, describe their functionalities and how they interact with one another, and describes the experiences with implementing the proposed architecture on Linux.
Patent
Fuzzy multi-level security
Pau-Chen Cheng,Shai Halevi,Trent Jaeger,Paul A. Karger,Ronald Perez,Pankaj Rohatgi,Angela Marie Schuett,Michael Steiner,Grant Wagner +8 more
TL;DR: In this article, a boundary range is defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the ranges is acceptable and in the ranges acceptable with mitigation measures.
Patent
Method of managing and mitigating security risks through planning
Kay S. Anderson,Pau-Chen Cheng,Mark D. Feblowitz,Genady Grabarnik,Shai Halevi,Nagui Halim,Trent Jaeger,Paul A. Karger,Zhen Liu,Ronald Perez,Anton V. Riabov,Pankaj Rohatgi,Angela Marie Schuett,Michael Steiner,Grant Wagner +14 more
TL;DR: In this paper, an exemplary method is provided for managing and mitigating security risks through planning, where a first security-related information of a requested product is received, followed by a second security related information of resources that are available for producing the requested product.
Proceedings Article
Risk based access control with uncertain and time-dependent sensitivity
John A. Clark,Juan E. Tapiador,John McDermid,Pau-Chen Cheng,Dakshi Agrawal,Natalie Ivanic,Dave Slogget +6 more
TL;DR: This paper provides practical templates to model both uncertainty and temporally characterized dependencies, and shows how these features can be naturally integrated into a recently proposed access control framework based on quantified risk.