메뉴 건너뛰기




Volumn 10, Issue 3, 2007, Pages

On interdomain routing security and pretty secure BGP (psBGP)

Author keywords

Authentication; BGP; Certificates; Interdomain routing; Public key infrastructure; Secure routing protocols; Trust

Indexed keywords

CERTIFICATES; INTERDOMAIN ROUTING; PUBLIC-KEY INFRASTRUCTURE; SECURE ROUTING PROTOCOLS;

EID: 34547504417     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1266977.1266980     Document Type: Article
Times cited : (102)

References (58)
  • 4
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • BELLOVIN, S. 1989. Security problems in the TCP/IP protocol suite. Computer Communications Review. 19, 32-48.
    • (1989) Computer Communications Review , vol.19 , pp. 32-48
    • BELLOVIN, S.1
  • 6
    • 34547531066 scopus 로고    scopus 로고
    • Using link cuts to attack internet routing
    • Unpublished manuscript
    • BELLOVIN, S. AND GANSNER, E. 2003. Using link cuts to attack internet routing. Unpublished manuscript.
    • (2003)
    • BELLOVIN, S.1    GANSNER, E.2
  • 9
    • 0025386404 scopus 로고
    • A logic of authentication
    • 39. Digital Systems Research Center of Digital Equipment Corporation, Palo Alto, CA, 1Feb, 18-36
    • BURROWS, M., ABADI, M., AND NEEDHAM, R. 1990. A logic of authentication. In Research Report 39. Digital Systems Research Center of Digital Equipment Corporation, Palo Alto, CA, 8, 1(Feb.), 18-36.
    • (1990) Research Report , vol.8
    • BURROWS, M.1    ABADI, M.2    NEEDHAM, R.3
  • 10
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multivalued mapping
    • DEMPSTER, A. 1967. Upper and lower probabilities induced by a multivalued mapping. The Annals of Statistics 28, 325-339.
    • (1967) The Annals of Statistics , vol.28 , pp. 325-339
    • DEMPSTER, A.1
  • 11
    • 34547518418 scopus 로고    scopus 로고
    • DHS. 2005. DHS secure routing workshop. Department of Homeland Security, Washington, D.C.
    • DHS. 2005. DHS secure routing workshop. Department of Homeland Security, Washington, D.C.
  • 12
    • 0025771853 scopus 로고
    • Applying a formal analysis technique to the CCIT X.509 strong two-way authentication protocol
    • GAARDER, K. AND SNEKKENES, E. 1991. Applying a formal analysis technique to the CCIT X.509 strong two-way authentication protocol. Journal of Cryptology 3, 81-98.
    • (1991) Journal of Cryptology , vol.3 , pp. 81-98
    • GAARDER, K.1    SNEKKENES, E.2
  • 13
    • 0034478521 scopus 로고    scopus 로고
    • Inferring autonomous system relationships in the Internet
    • GAO, L. 2000. Inferring autonomous system relationships in the Internet. In IEEE Global Internet.
    • (2000) IEEE Global Internet
    • GAO, L.1
  • 19
    • 34547551024 scopus 로고    scopus 로고
    • HOUSLEY, R., FORD, W., POLK, W., AND SOLO, D. 1999. Internet X.509 public key infrastructure-certificate and CRL profile. IETF RFC 2459.
    • HOUSLEY, R., FORD, W., POLK, W., AND SOLO, D. 1999. Internet X.509 public key infrastructure-certificate and CRL profile. IETF RFC 2459.
  • 26
    • 34547519314 scopus 로고    scopus 로고
    • An infrastructure supporting secure internet routing
    • KENT, S. 2006. An infrastructure supporting secure internet routing. In Third European PKI Workshop.
    • (2006) Third European PKI Workshop
    • KENT, S.1
  • 31
    • 34547552731 scopus 로고    scopus 로고
    • KOBLITZ, N. AND MENEZES, A. 2004. Another look at provable security. Cryptology ePrint Archive, Report 2004/152. To Appear in Journal of Cryptology. http://eprint.iacr.org/2004/152/.
    • KOBLITZ, N. AND MENEZES, A. 2004. Another look at "provable security." Cryptology ePrint Archive, Report 2004/152. To Appear in Journal of Cryptology. http://eprint.iacr.org/2004/152/.
  • 33
    • 34547541092 scopus 로고    scopus 로고
    • KUMAR, B. AND CROWCROFT, J. 1993. Integrating security in interdomain routing protocols. ACM SIGCOMM Computer Communication Review 23, 5 (Oct.), 36-51.
    • KUMAR, B. AND CROWCROFT, J. 1993. Integrating security in interdomain routing protocols. ACM SIGCOMM Computer Communication Review 23, 5 (Oct.), 36-51.
  • 34
    • 34547497426 scopus 로고    scopus 로고
    • LYNN, C., KENT, S., AND SEO, K. 2003. X.509 Extensions for IP Addresses and AS Identifiers. draft-ietf-pkix-x509- ipaddr-as-extn-02.txt.
    • LYNN, C., KENT, S., AND SEO, K. 2003. X.509 Extensions for IP Addresses and AS Identifiers. draft-ietf-pkix-x509- ipaddr-as-extn-02.txt.
  • 37
  • 38
  • 40
    • 0003828107 scopus 로고
    • Network layer protocols with byzantine robustness
    • Tech. Rep. MIT/LCS/TR-429
    • PERLMAN, R. 1988. Network layer protocols with byzantine robustness. Tech. Rep. MIT/LCS/TR-429.
    • (1988)
    • PERLMAN, R.1
  • 42
    • 34547549087 scopus 로고    scopus 로고
    • REKHTER, Y. AND LI, T. 1995. Aborder gateway protocol 4(BGP 4). IETF RFC 1771.
    • REKHTER, Y. AND LI, T. 1995. Aborder gateway protocol 4(BGP 4). IETF RFC 1771.
  • 52
    • 34547540445 scopus 로고    scopus 로고
    • WAN, T., VAN OORSCHOT, P., AND KRANAKIS, E. 2007. A selective introduction to border gateway protocol (BGP) security issues. In Proceedings of the NATO Advanced Studies Institute on Network Security and Intrusion Detection. Nork, Yerevan, Armenia. IOS Press (to appear, 2007).
    • WAN, T., VAN OORSCHOT, P., AND KRANAKIS, E. 2007. A selective introduction to border gateway protocol (BGP) security issues. In Proceedings of the NATO Advanced Studies Institute on Network Security and Intrusion Detection. Nork, Yerevan, Armenia. IOS Press (to appear, 2007).
  • 53
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP through secure origin BGP
    • WHITE, R. 2003. Securing BGP through secure origin BGP. The Internet Protocol Journal 6, 3, 15-22.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3 , pp. 15-22
    • WHITE, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.