The End-to-End Argument and Application Design: The Role of Trust
暂无分享,去创建一个
[1] Iesg. IETF Policy on Wiretapping , 2000 .
[2] Sally Floyd,et al. IAB Architectural and Policy Considerations for Open Pluggable Edge Services , 2002, RFC.
[3] Jeffrey I. Schiller. Strong Security Requirements for Internet Engineering Task Force Standard Protocols , 2002, RFC.
[4] Tim Moors. A critical review of "End-to-end arguments in system design" , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[5] Iesg. IAB and IESG Statement on Cryptographic Technology and the Internet , 1996 .
[6] Brian E. Carpenter,et al. Architectural Principles of the Internet , 1996, RFC.
[7] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[8] Internet Architecture Board,et al. The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture , 2004, RFC.
[9] Alden W. Jackson,et al. Commentaries on "Active networking and end-to-end arguments" , 1998, IEEE Netw..
[10] Internet Architecture Board,et al. IETF Policy on Wiretapping , 2000, RFC.
[11] David D. Clark,et al. Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..
[12] Barbara van Schewick. Architecture & innovation: the role of the end-to-end arguments in the original internet , 2005 .
[13] David Wetherall,et al. Towards an active network architecture , 1996, CCRV.
[14] William E. Moen,et al. Realizing the information future: The internet and beyond , 1996 .
[15] Internet Architecture Board,et al. IAB and IESG Statement on Cryptographic Technology and the Internet , 1996, RFC.