A Dynamic Timeout Control Algorithm in Software Defined Networks
暂无分享,去创建一个
Sungyong Park | Taekhee Kim | Jun-Hee Lee | Kwonyong Lee | Byungjoon Lee | Young Hwa Kim | Kwonyong Lee | Jun-Hee Lee | Byungjoon Lee | Young Hwa Kim | Sungyong Park | Kwonyong Lee | Taekhee Kim | Jun-Hee Lee | Byungjoon Lee
[1] Fang Hao,et al. Towards an elastic distributed SDN controller , 2013, HotSDN '13.
[2] Alfredo De Santis,et al. A note on time-bound hierarchical key assignment schemes , 2013, Inf. Process. Lett..
[3] Sujata Banerjee,et al. DevoFlow: scaling flow management for high-performance networks , 2011, SIGCOMM.
[4] Daniel Alonso Martinez,et al. A verification of selected properties of Telecommunication traffic generated by OPNET simulator , 2011 .
[5] David A. Maltz,et al. Network traffic characteristics of data centers in the wild , 2010, IMC '10.
[6] Martín Casado,et al. Onix: A Distributed Control Platform for Large-scale Production Networks , 2010, OSDI.
[7] Jia Wang,et al. Scalable flow-based networking with DIFANE , 2010, SIGCOMM '10.
[8] Albert G. Greenberg,et al. The nature of data center traffic: measurements & analysis , 2009, IMC '09.
[9] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[10] Jyh-haw Yeh,et al. A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem , 2008, Inf. Process. Lett..
[11] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[12] Alfredo De Santis,et al. Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..
[13] Hung-Yu Chen,et al. Efficient time-bound hierarchical key assignment scheme , 2004 .
[14] Yiming Ye,et al. Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..
[15] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.
[16] L. Harn,et al. Refereed article: A cryptographic key generation scheme for multilevel data security , 1990 .
[17] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[18] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[19] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[20] G. Jenkins,et al. Time Series Analysis: Forecasting and Control , 1978 .
[21] H. Akaike. Fitting autoregressive models for prediction , 1969 .
[22] Adam Zarek,et al. OpenFlow Timeouts Demystied , 2012 .
[23] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[24] Philippe Olivier,et al. Flow level IP traffic characterization , 2001 .
[25] W. Weibull. A Statistical Distribution Function of Wide Applicability , 1951 .