A layered naming architecture for the internet
暂无分享,去创建一个
Michael Walfish | Hari Balakrishnan | Scott Shenker | Ion Stoica | Sylvia Ratnasamy | Karthik Lakshminarayanan | H. Balakrishnan | I. Stoica | S. Shenker | S. Ratnasamy | K. Lakshminarayanan | Michael Walfish
[1] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[2] Xiaowei Yang,et al. NIRA: a new Internet routing architecture , 2003, FDNA '03.
[3] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[4] Ralph Droms,et al. What's In A Name: Thoughts from the NSRG , 2003 .
[5] Pyda Srisuresh,et al. Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.
[6] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[7] G.J. Minden,et al. A survey of active network research , 1997, IEEE Communications Magazine.
[8] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[9] Mark Handley,et al. From protocol stack to protocol heap: role-based architecture , 2003, CCRV.
[10] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[11] Robbert van Renesse,et al. Implementing IPv6 as a peer-to-peer overlay network , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[12] Paul Francis,et al. Addressing in internetwork protocols , 1994 .
[13] Michael Walfish,et al. Untangling the Web from DNS , 2004, NSDI.
[14] David D. Clark,et al. Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.
[15] Charles Lynn,et al. Endpoint Identifier Destination Option , 1996 .
[16] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[17] Mark Alexander Connell Snoeren. A session-based architecture for Internet mobility , 2002 .
[18] Ion Stoica,et al. Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..
[19] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[20] Michalis Faloutsos,et al. PeerNet: Pushing Peer-to-Peer Down the Stack , 2003, IPTPS.
[21] Renato Iannella,et al. URN Namespace Definition Mechanisms , 1999, RFC.
[22] David D. Clark,et al. FARA: reorganizing the addressing architecture , 2003, FDNA '03.
[23] Timothy Roscoe,et al. Predicate routing: enabling controlled networking , 2003, CCRV.
[24] Paul Francis,et al. IPNL: A NAT-extended internet architecture , 2001, SIGCOMM '01.
[25] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[26] M. van Steen,et al. Scalable User-Friendly Resource Names , 2001 .
[27] Craig Partridge,et al. Smart packets: applying active networks to network management , 2000, TOCS.
[28] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[29] Charles E. Perkins,et al. A Mobile Host Protocol Supporting Route Optimization and Authentication , 1995, IEEE J. Sel. Areas Commun..
[30] Franz J. Hauck,et al. Locating objects in wide-area systems , 1998, IEEE Commun. Mag..
[31] Hari Balakrishnan,et al. An end-to-end approach to host mobility , 2000, MobiCom '00.
[32] Michael J. O'Donnell,et al. Open Network Handles Implemented in DNS , 2003, ArXiv.
[33] Andrew G. Malis,et al. A Framework for IP Based Virtual Private Networks , 2000, RFC.
[34] Indranil Gupta,et al. Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.
[35] Miguel Castro,et al. Security for Structured Peer-to-peer Overlay Networks , 2004 .
[36] Anjali Gupta,et al. Efficient Routing for Peer-to-Peer Overlays , 2004, NSDI.
[37] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[38] Kenneth L. Calvert,et al. Lightweight network support for scalable end-to-end services , 2002, SIGCOMM '02.
[39] Michael Walfish,et al. Middleboxes No Longer Considered Harmful , 2004, OSDI.
[40] Larry L. Peterson,et al. A dynamic network architecture , 1992, TOCS.
[41] Karen R. Sollins,et al. Architectural Principles of Uniform Resource Name Resolution , 1998, RFC.
[42] DruschelPeter,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001 .
[43] David R. Karger,et al. Looking up data in P2P systems , 2003, CACM.
[44] J. Noel Chiappa,et al. The Nimrod Routing Architecture , 1996, RFC.
[45] Karen R. Sollins,et al. Functional Requirements for Uniform Resource Names , 1994, RFC.
[46] Jerome H. Saltzer,et al. On the Naming and Binding of Network Destinations , 1993, RFC.
[47] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[48] P. Francis,et al. A near-term architecture for deploying Pip , 1993, IEEE Network.
[49] Richard Gold,et al. Network pointers , 2003, CCRV.
[50] Ben Y. Zhao,et al. Distributed Object Location in a Dynamic Network , 2002, SPAA '02.
[51] Emin Gün Sirer,et al. Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays , 2004, NSDI.
[52] Hari Balakrishnan,et al. Reconsidering Internet mobility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[53] Pekka Nikander,et al. Integrating Security, Mobility and Multi-Homing in a HIP Way , 2003, NDSS.
[54] Robbert van Renesse,et al. P6P: A Peer-to-Peer Approach to Internet Infrastructure , 2004, IPTPS.
[55] Bryan Ford,et al. Unmanaged Internet Protocol , 2004, Comput. Commun. Rev..