posted on 2002-06-01, 00:00authored byEdmund M Clarke, Somesh Jha, Will Marrero
As more resources are added to computer networks, and as more vendors look to the World Wide Web as a viable marketplace, the importance of being able to restrict access and to ensure some kind of acceptable behavior even in the presence of malicious adversaries becomes paramount.