메뉴 건너뛰기




Volumn , Issue , 2009, Pages 150-161

Unified declarative platform for secure networked information systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED COMMUNICATION; DATA ANALYSIS; DATALOG; DISTRIBUTED NETWORKS; DISTRIBUTED SYSTEMS; LOCAL CLUSTER; LOGIC-BASED LANGUAGES; NETWORK SECURITY ANALYSIS; NETWORKED INFORMATION SYSTEMS; NETWORKED SYSTEMS; PERFORMANCE STUDY; PLANETLAB; RECURSIVE QUERY PROCESSING; SECURE NETWORKS; SECURITY POLICY; TRUST MANAGEMENT SYSTEMS;

EID: 67649635248     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2009.58     Document Type: Conference Paper
Times cited : (21)

References (34)
  • 1
    • 65249178263 scopus 로고    scopus 로고
    • Network monitors and contracting systems: Competition and innovation
    • P. Laskowski and J. Chuang, "Network monitors and contracting systems: Competition and innovation," in SIGCOMM, 2007.
    • (2007) SIGCOMM
    • Laskowski, P.1    Chuang, J.2
  • 3
    • 46149120818 scopus 로고    scopus 로고
    • Forensic analysis for epidemic attacks in federated networks
    • Y. Xie, V. Sekar, M. Reiter, and H. Zhang, "Forensic analysis for epidemic attacks in federated networks," in ICNP, 2006.
    • (2006) ICNP
    • Xie, Y.1    Sekar, V.2    Reiter, M.3    Zhang, H.4
  • 4
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A Trust Management System With Certified Evaluation
    • May
    • T. Jim, "SD3: A Trust Management System With Certified Evaluation," in IEEE Symposium on Security and Privacy, May 2001.
    • (2001) IEEE Symposium on Security and Privacy
    • Jim, T.1
  • 5
    • 22244485369 scopus 로고    scopus 로고
    • Delegation Logic: A logicbased approach to distributed authorization
    • Feb
    • N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation Logic: A logicbased approach to distributed authorization," ACM TISSEC, Feb. 2003.
    • (2003) ACM TISSEC
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 8
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • N. Li, W. H. Winsborough, and J. C. Mitchell, "Distributed credential chain discovery in trust management," Journal of Computer Security, vol. 11, no. 1, pp. 35-86, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 10
    • 67649674305 scopus 로고    scopus 로고
    • Declarative Routing: Extensible Routing with Declarative Queries
    • Boon Thau Loo et. al, "Declarative Routing: Extensible Routing with Declarative Queries," in SIGCOMM, 2005.
    • (2005) SIGCOMM
    • Thau Loo, B.1    et., al.2
  • 12
    • 34250652156 scopus 로고    scopus 로고
    • Declarative Networking: Language, Execution and Optimization
    • June
    • Boon Thau Loo et. al., "Declarative Networking: Language, Execution and Optimization," in ACM SIGMOD, June 2006.
    • (2006) ACM SIGMOD
    • Thau Loo, B.1    et., al.2
  • 13
    • 0002439387 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • P. Buneman, S. Khanna, and W. C. Tan, "Why and where: A characterization of data provenance," in ICDT, 2001.
    • (2001) ICDT
    • Buneman, P.1    Khanna, S.2    Tan, W.C.3
  • 14
    • 58149319645 scopus 로고
    • A Survey of Research on Deductive Database Systems
    • R. Ramakrishnan and J. D. Ullman, "A Survey of Research on Deductive Database Systems," Journal of Logic Programming, vol. 23, no. 2, pp. 125-149, 1993.
    • (1993) Journal of Logic Programming , vol.23 , Issue.2 , pp. 125-149
    • Ramakrishnan, R.1    Ullman, J.D.2
  • 19
    • 0001251855 scopus 로고
    • Authentication in Distributed Systems: Theory and Practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in Distributed Systems: Theory and Practice," ACM TOCS, 1992.
    • (1992) ACM TOCS
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 20
    • 85027186168 scopus 로고
    • Magic Sets and Other Strange Ways to Implement Logic Programs
    • F. Bancilhon, D. Maier, Y. Sagiv, and J. Ullman, "Magic Sets and Other Strange Ways to Implement Logic Programs," in SIGMOD, 1986.
    • (1986) SIGMOD
    • Bancilhon, F.1    Maier, D.2    Sagiv, Y.3    Ullman, J.4
  • 21
    • 67649645600 scopus 로고    scopus 로고
    • Y. Mao, B. T. Loo, Z. Ives, and J. M. Smith, MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition, University of Pennsylvania CIS Technical Report No. MS-CIS-08-21, 2008.
    • Y. Mao, B. T. Loo, Z. Ives, and J. M. Smith, "MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition," University of Pennsylvania CIS Technical Report No. MS-CIS-08-21, 2008.
  • 22
    • 84869322077 scopus 로고    scopus 로고
    • Secure BGP
    • Secure BGP, http://www.ir.bbn.com/sbgp/.
  • 25
    • 34547285007 scopus 로고    scopus 로고
    • The Design of the Borealis Stream Processing Engine
    • Daniel J. Abadi et. al., "The Design of the Borealis Stream Processing Engine," in CIDR, 2005.
    • (2005) CIDR
    • Abadi, D.J.1    et., al.2
  • 26
    • 33646580035 scopus 로고    scopus 로고
    • Secure context-sensitive authorization
    • K. Minami and D. Kotz, "Secure context-sensitive authorization," in PERCOM, 2005.
    • (2005) PERCOM
    • Minami, K.1    Kotz, D.2
  • 29
    • 77749271723 scopus 로고    scopus 로고
    • Towards a Language and System for Secure Networking
    • M. Abadi and B. T. Loo, "Towards a Language and System for Secure Networking," in NetDB, 2007.
    • (2007) NetDB
    • Abadi, M.1    Loo, B.T.2
  • 30
    • 67649663086 scopus 로고    scopus 로고
    • Provenance-aware Secure Networks
    • W. Zhou, E. Cronin, and B. T. Loo, "Provenance-aware Secure Networks," in NetDB, 2008.
    • (2008) NetDB
    • Zhou, W.1    Cronin, E.2    Loo, B.T.3
  • 31
    • 52649140439 scopus 로고    scopus 로고
    • A security punctuation framework for enforcing access control on streaming data
    • R. V. Nehme, E. A. Rundensteiner, and E. Bertino, "A security punctuation framework for enforcing access control on streaming data," in ICDE, 2008.
    • (2008) ICDE
    • Nehme, R.V.1    Rundensteiner, E.A.2    Bertino, E.3
  • 32
    • 67649652852 scopus 로고    scopus 로고
    • Specifying Access Control Policies on Data Streams
    • Barbara Carminati and Elena Ferrari and Kian-Lee Tan, "Specifying Access Control Policies on Data Streams," in DASFAA, 2007.
    • (2007) DASFAA
    • Carminati, B.1    Ferrari, E.2    Tan, K.-L.3
  • 33
    • 0036040302 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet, "Analyzing security protocols with secrecy types and logic programs," in POPL, 2002.
    • (2002) POPL
    • Abadi, M.1    Blanchet, B.2
  • 34
    • 0003150474 scopus 로고    scopus 로고
    • A model, analysis, and protocol framework for soft state-based communication
    • S. Raman and S. McCanne, "A model, analysis, and protocol framework for soft state-based communication," in SIGCOMM, 1999.
    • (1999) SIGCOMM
    • Raman, S.1    McCanne, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.