The SwitchWare active network architecture
暂无分享,去创建一个
William A. Arbaugh | Jonathan M. Smith | Michael Hicks | Carl A. Gunter | Scott M. Nettles | Jonathan T. Moore | Angelos D. Keromytis | Pankaj Kakkar | D. S. Alexander | Jonathan M. Smith | W. Arbaugh | A. Keromytis | D. Alexander | M. Hicks | P. Kakkar | Jonathan T. Moore | S. Nettles | J. Hicks
[1] Carl A. Gunter. Semantics of programming languages: structures and techniques , 1993, Choice Reviews Online.
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[4] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[5] G.J. Minden,et al. A survey of active network research , 1997, IEEE Communications Magazine.
[6] Marianne Shaw,et al. Active bridging , 1997, SIGCOMM '97.
[7] Angelos D. Keromytis,et al. A Secure Active Network Environment Architecture , 1997 .
[8] Troy Downing,et al. Java Virtual Machine , 1997 .
[9] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[10] David Wetherall,et al. Introducing new Internet services: why and how , 1998, IEEE Netw..
[11] Jonathan M. Smith,et al. Protocol boosters , 1998, IEEE J. Sel. Areas Commun..
[12] Carl A. Gunter,et al. PLAN : A Programming Language for Active Networkssubmitted to PLDI ' 98 , 1998 .
[13] Liwu Li,et al. The Java Language , 1998 .
[14] Angelos D. Keromytis,et al. A secure active network environment architecture: realization in SwitchWare , 1998, IEEE Netw..