A Policy Framework for the Future Internet
暂无分享,去创建一个
Michael Walfish | Scott Shenker | David Mazières | Jad Naous | Antonio Nicolosi | Arun Seehra | S. Shenker | David Mazières | J. Naous | Michael Walfish | Antonio Nicolosi | Arun Seehra
[1] David D. Clark,et al. Tussle in cyberspace: defining tomorrow's Internet , 2002, IEEE/ACM Transactions on Networking.
[2] Deborah Estrin,et al. Visa protocols for controlling interorganizational datagram flow , 1989, IEEE J. Sel. Areas Commun..
[3] Michael Walfish,et al. Middleboxes No Longer Considered Harmful , 2004, OSDI.
[4] Stefan Savage,et al. Fatih: detecting and isolating malicious routers , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[5] X.. Yang,et al. NIRA: A New Inter-Domain Routing Architecture , 2007, IEEE/ACM Transactions on Networking.
[6] Krishna P. Gummadi,et al. Improving the Reliability of Internet Paths with One-hop Source Routing , 2004, OSDI.
[7] Pekka Nikander,et al. Host Identity Protocol (HIP) Architecture , 2006, RFC.
[8] Mike Little. Goals and functional requirements for inter-autonomous system routing , 1989, RFC.
[9] H. Niedermayer,et al. Accountable Internet Protocol , 2009 .
[10] Kai Sorensen,et al. Federal Information Processing Standards Publication , 1985 .
[11] Xiaowei Yang,et al. Source selectable path diversity via routing deflections , 2006, SIGCOMM.
[12] Radia J. Perlman,et al. Routing with Byzantine robustness , 2005 .
[13] Deborah Estrin,et al. Security issues in policy routing , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[14] David R. Cheriton,et al. Loose source routing as a mechanism for traffic policies , 2004, FDNA '04.
[15] Martín Casado,et al. Ethane: taking control of the enterprise , 2007, SIGCOMM '07.
[16] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[17] Hong Yan,et al. A clean slate 4D approach to network control and management , 2005, CCRV.
[18] Saikat Guha,et al. An end-middle-end approach to connection establishment , 2007, SIGCOMM '07.
[19] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[20] Nick Feamster,et al. Design and implementation of a routing control platform , 2005, NSDI.
[21] Argyraki,et al. Network Capabilities : The Good , the Bad and the Ugly Katerina , 2022 .
[22] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[23] Brighten Godfrey,et al. Pathlet routing , 2009, SIGCOMM '09.
[24] Ratul Mahajan,et al. Mutually Controlled Routing with Independent ISPs , 2007, NSDI.
[25] Xin Liu,et al. To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.
[26] Dawn Xiaodong Song,et al. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense , 2006, IEEE Journal on Selected Areas in Communications.
[27] Hisashi Kobayashi,et al. Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.
[28] Shivkumar Kalyanaraman,et al. BANANAS: an evolutionary framework for explicit and multipath routing in the internet , 2003, FDNA '03.
[29] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.
[30] Alex C. Snoeren,et al. A system for authenticated policy-compliant routing , 2004, SIGCOMM '04.
[31] Josef Stoer,et al. Numerische Mathematik 1 , 1989 .
[32] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[33] Jennifer Rexford,et al. MIRO: multi-path interdomain routing , 2006, SIGCOMM.
[34] Deborah Estrin,et al. Source Demand Routing: Packet Format and Forwarding Specification (Version 1) , 1996, RFC.
[35] U. Austin,et al. The design and implementation of a policy framework for the future Internet , 2009 .
[36] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[37] David Mazières,et al. Separating key management from file system security , 1999, SOSP.