메뉴 건너뛰기




Volumn 3, Issue 1, 2001, Pages 4-18

The price of safety in an active network

Author keywords

Active networking; Performance; Security

Indexed keywords


EID: 0038972375     PISSN: 12292370     EISSN: None     Source Type: Journal    
DOI: 10.1109/JCN.2001.6596875     Document Type: Article
Times cited : (19)

References (44)
  • 3
    • 84889192555 scopus 로고    scopus 로고
    • A secure active network environment architecture
    • Pennsylvania Univ., Nov.
    • D. S. Alexander et al., "A secure active network environment architecture," Technical Report MS-CIS-97-17, Pennsylvania Univ., Nov. 1997.
    • (1997) Technical Report MS-CIS-97-17
    • Alexander, D.S.1
  • 4
    • 84878579140 scopus 로고    scopus 로고
    • The architecture of ALIEN
    • Proc. 1st International Working Conf. Active Networks (IWAN'99), July
    • D. S. Alexander and J. M. Smith, "The architecture of ALIEN," in Proc. 1st International Working Conf. Active Networks (IWAN'99), Lecture Notes in Computer Science, July 1999.
    • (1999) Lecture Notes in Computer Science
    • Alexander, D.S.1    Smith, J.M.2
  • 5
    • 0041983970 scopus 로고    scopus 로고
    • RCANE: A resource controlled framework for active network services
    • Lecture Notes in Computer Science, July
    • P. Menage, "RCANE: A resource controlled framework for active network services," in Proc. 1st International Working Conf. Active Networks (IWAN'99), Lecture Notes in Computer Science, July 1999.
    • (1999) Proc. 1st International Working Conf. Active Networks (IWAN'99)
    • Menage, P.1
  • 6
    • 0032178221 scopus 로고    scopus 로고
    • Best-effort versus reservations: A simple comparative analysis
    • Sept.
    • L. Breslau and S. Shenker, "Best-effort versus reservations: A simple comparative analysis," in Proc. ACM SIGCOMM, vol. 28, Sept. 1998.
    • (1998) Proc. ACM SIGCOMM , vol.28
    • Breslau, L.1    Shenker, S.2
  • 7
    • 85013350011 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • Sept.
    • V. Paxson and S. Floyd, "Wide-area traffic: The failure of poisson modeling," in Proc. ACM SIGCOMM, vol. 24, Sept. 1994, pp. 257-268.
    • (1994) Proc. ACM SIGCOMM , vol.24 , pp. 257-268
    • Paxson, V.1    Floyd, S.2
  • 8
    • 85013591309 scopus 로고
    • On the self-similar nature of ethernet traffic
    • Sept.
    • W. E. Leland et al., "On the self-similar nature of Ethernet traffic," in Proc. ACM SIGCOMM, vol. 23, Sept. 1993, pp. 183-193.
    • (1993) Proc. ACM SIGCOMM , vol.23 , pp. 183-193
    • Leland, W.E.1
  • 9
    • 0003917549 scopus 로고
    • Explaining world wide web traffic self-similarity
    • Boston Univ., Aug.
    • M. Crovella and A. Bestavros, "Explaining world wide web traffic self-similarity," Technical Report 95-015. Boston Univ., Aug. 1995.
    • (1995) Technical Report 95-015
    • Crovella, M.1    Bestavros, A.2
  • 10
    • 0012022036 scopus 로고
    • Scout: A communications-oriented operating system
    • Department of Computer Science, Arizona Univ., June
    • A. B. Montz et al., "Scout: A communications-oriented operating system," Technical Report, Department of Computer Science, Arizona Univ., June 1994.
    • (1994) Technical Report
    • Montz, A.B.1
  • 11
    • 0030244801 scopus 로고    scopus 로고
    • The design and implementation of an operating system to support distributed multimedia applications
    • Sept.
    • I. M. Leslie et al., "The design and implementation of an operating system to support distributed multimedia applications," IEEE J. Select. Areas Commun., vol. 14, pp. 1280-1297, Sept. 1996.
    • (1996) IEEE J. Select. Areas Commun. , vol.14 , pp. 1280-1297
    • Leslie, I.M.1
  • 14
    • 0003508568 scopus 로고
    • Data encryption standard
    • U.S. Department of Commerce, Jan.
    • "Data encryption standard," Technical Report FIPS-46, U.S. Department of Commerce, Jan. 1977.
    • (1977) Technical Report FIPS-46
  • 15
    • 84957806781 scopus 로고
    • Secure hash standard
    • U.S. Department of Commerce, Apr. 1995. Also known as: 59 Fed Reg 35317
    • "Secure hash standard," Technical Report FIPS-180-1, U.S. Department of Commerce, Apr. 1995. Also known as: 59 Fed Reg 35317, 1994.
    • (1994) Technical Report FIPS-180-1
  • 16
    • 0003508562 scopus 로고
    • Digital signature standard
    • U.S. Department of Commerce, May
    • "Digital signature standard," Technical Report FIPS-186, U.S. Department of Commerce, May 1994.
    • (1994) Technical Report FIPS-186
  • 19
    • 0004241428 scopus 로고    scopus 로고
    • NodeOS interface specification
    • Jan. Draft
    • L. Peterson, (ed.), "NodeOS interface specification," AN Node OS Working Group, Jan. 2000. Draft.
    • (2000) AN Node OS Working Group
    • Peterson, L.1
  • 20
    • 0032631515 scopus 로고    scopus 로고
    • PLANet: An active internetwork
    • Mar.
    • M. Hicks et al., "PLANet: An active internetwork," in Proc. IEEE INFOCOM'99, Mar. 1999.
    • (1999) Proc. IEEE INFOCOM'99
    • Hicks, M.1
  • 21
    • 84983308848 scopus 로고    scopus 로고
    • ANTS: A toolkit for building and dynamically deploying network protocols
    • Apr.
    • D. J. Wetherall, J. Guttag, and D. L. Tennenhouse, "ANTS: A toolkit for building and dynamically deploying network protocols," in Proc. OPENARCH'98, Apr. 1998.
    • (1998) Proc. OPENARCH'98
    • Wetherall, D.J.1    Guttag, J.2    Tennenhouse, D.L.3
  • 22
    • 84974687699 scopus 로고
    • Scheduling algorithms for multiprogramming in a hard real-time environment
    • Feb.
    • C. Liu and J. Layland, "Scheduling algorithms for multiprogramming in a hard real-time environment," J. ACM, vol. 20, pp. 46-61, Feb. 1973.
    • (1973) J. ACM , vol.20 , pp. 46-61
    • Liu, C.1    Layland, J.2
  • 23
    • 0024889726 scopus 로고
    • Analysis and simulation of a fair queueing algorithm
    • Sept.
    • A Demers, S. Keshav, and S. Shenker, "Analysis and simulation of a fair queueing algorithm," in Proc. ACM SIGCOMM, vol. 19, Sept. 1989, pp. 1-12.
    • (1989) Proc. ACM SIGCOMM , vol.19 , pp. 1-12
    • Demers, A.1    Keshav, S.2    Shenker, S.3
  • 26
    • 0041081898 scopus 로고    scopus 로고
    • A web navigator with applets in Caml
    • May
    • F. Rouaix, "A web navigator with applets in Caml," Fifth WWW Conf., May 1996. Available at http://pauillac.inria.fr/mmm/papers/mmm.ps.gz.
    • (1996) Fifth WWW Conf.
    • Rouaix, F.1
  • 29
    • 0347470584 scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • Sept.
    • L. Gong and P. Syverson, "Fail-stop protocols: An approach to designing secure protocols," in Proc. IFIP DCCA-5, Sept. 1995.
    • (1995) Proc. IFIP DCCA-5
    • Gong, L.1    Syverson, P.2
  • 30
    • 0004601832 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • Mar.
    • P. Karn and W. Simpson, "Photuris: Session-key management protocol," RFC 2522, Mar. 1999.
    • (1999) RFC 2522
    • Karn, P.1    Simpson, W.2
  • 31
    • 4544387815 scopus 로고    scopus 로고
    • Internet security association and key management protocol (ISAKMP)
    • June
    • D. Maughan et al., "Internet security association and key management protocol (ISAKMP)," Internet Draft, IPSEC Working Group, June 1996.
    • (1996) Internet Draft, IPSEC Working Group
    • Maughan, D.1
  • 33
    • 0039302747 scopus 로고    scopus 로고
    • Application-allocated I/O buffering with system-allocated performance
    • Carnegie Mellon Univ., Pittsburgh, PA., Aug.
    • J. C. Brustoloni and P. Steenkiste, "Application-allocated I/O buffering with system-allocated performance," Technical Report CMU-CS-96-169, Carnegie Mellon Univ., Pittsburgh, PA., Aug. 1996.
    • (1996) Technical Report CMU-CS-96-169
    • Brustoloni, J.C.1    Steenkiste, P.2
  • 35
    • 0023367454 scopus 로고
    • Garbage collection can be faster than stack allocation
    • June
    • A. W. Appel, "Garbage collection can be faster than stack allocation," Information Processing Lett., vol. 25, pp. 275-279. June 1987.
    • (1987) Information Processing Lett. , vol.25 , pp. 275-279
    • Appel, A.W.1
  • 36
    • 0017956645 scopus 로고
    • List processing in real-time on a serial computer
    • H. G. Baker, "List processing in real-time on a serial computer," Commun. ACM, vol. 21, no. 4, pp. 280-94, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.4 , pp. 280-294
    • Baker, H.G.1
  • 41
    • 0001982732 scopus 로고    scopus 로고
    • A survey of active network research
    • Jan.
    • D. L. Tennenhouse et al., "A survey of active network research," IEEE Commun. Mag., pp. 80-86, Jan. 1997.
    • (1997) IEEE Commun. Mag. , pp. 80-86
    • Tennenhouse, D.L.1
  • 42
    • 0344614688 scopus 로고    scopus 로고
    • Activating networks: A progress report
    • Apr.
    • J. M. Smith et al., "Activating networks: A progress report," IEEE Computer, vol. 32, pp. 32-41, Apr. 1999.
    • (1999) IEEE Computer , vol.32 , pp. 32-41
    • Smith, J.M.1
  • 43
    • 35248883200 scopus 로고
    • Extending a capability based system into a network environment
    • Aug.
    • R. D. Sansom, D. P. Julin, and R. F. Rashid, "Extending a capability based system into a network environment," in Proc. ACM SIGCOMM, Aug. 1986.
    • (1986) Proc. ACM SIGCOMM
    • Sansom, R.D.1    Julin, D.P.2    Rashid, R.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.