-
1
-
-
65249178263
-
Network monitors and contracting systems: Competition and innovation
-
P. Laskowski and J. Chuang, "Network monitors and contracting systems: Competition and innovation," in SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Laskowski, P.1
Chuang, J.2
-
2
-
-
0001647024
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in SIGCOMM, 2000.
-
(2000)
SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
3
-
-
46149120818
-
Forensic analysis for epidemic attacks in federated networks
-
Y. Xie, V. Sekar, M. Reiter, and H. Zhang, "Forensic analysis for epidemic attacks in federated networks," in ICNP, 2006.
-
(2006)
ICNP
-
-
Xie, Y.1
Sekar, V.2
Reiter, M.3
Zhang, H.4
-
4
-
-
0034829512
-
SD3: A Trust Management System With Certified Evaluation
-
May
-
T. Jim, "SD3: A Trust Management System With Certified Evaluation," in IEEE Symposium on Security and Privacy, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Jim, T.1
-
5
-
-
22244485369
-
Delegation Logic: A logicbased approach to distributed authorization
-
Feb
-
N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation Logic: A logicbased approach to distributed authorization," ACM TISSEC, Feb. 2003.
-
(2003)
ACM TISSEC
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
8
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
N. Li, W. H. Winsborough, and J. C. Mitchell, "Distributed credential chain discovery in trust management," Journal of Computer Security, vol. 11, no. 1, pp. 35-86, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
10
-
-
67649674305
-
Declarative Routing: Extensible Routing with Declarative Queries
-
Boon Thau Loo et. al, "Declarative Routing: Extensible Routing with Declarative Queries," in SIGCOMM, 2005.
-
(2005)
SIGCOMM
-
-
Thau Loo, B.1
et., al.2
-
11
-
-
84885583527
-
Implementing Declarative Overlays
-
B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica, "Implementing Declarative Overlays," in ACM SOSP, 2005.
-
(2005)
ACM SOSP
-
-
Loo, B.T.1
Condie, T.2
Hellerstein, J.M.3
Maniatis, P.4
Roscoe, T.5
Stoica, I.6
-
12
-
-
34250652156
-
Declarative Networking: Language, Execution and Optimization
-
June
-
Boon Thau Loo et. al., "Declarative Networking: Language, Execution and Optimization," in ACM SIGMOD, June 2006.
-
(2006)
ACM SIGMOD
-
-
Thau Loo, B.1
et., al.2
-
13
-
-
0002439387
-
Why and where: A characterization of data provenance
-
P. Buneman, S. Khanna, and W. C. Tan, "Why and where: A characterization of data provenance," in ICDT, 2001.
-
(2001)
ICDT
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
14
-
-
58149319645
-
A Survey of Research on Deductive Database Systems
-
R. Ramakrishnan and J. D. Ullman, "A Survey of Research on Deductive Database Systems," Journal of Logic Programming, vol. 23, no. 2, pp. 125-149, 1993.
-
(1993)
Journal of Logic Programming
, vol.23
, Issue.2
, pp. 125-149
-
-
Ramakrishnan, R.1
Ullman, J.D.2
-
15
-
-
67649663096
-
On Access Control, Data Integration and Their Languages
-
Springer-Verlag, pp
-
M. Abadi, "On Access Control, Data Integration and Their Languages," Computer Systems: Theory, Technology and Applications, A Tribute to Roger Needham, vol. Springer-Verlag, pp. 9-14, 2004.
-
(2004)
Computer Systems: Theory, Technology and Applications, A Tribute to Roger Needham, vol
, pp. 9-14
-
-
Abadi, M.1
-
16
-
-
0010390897
-
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," in SIGCOMM, 2001.
-
(2001)
SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
17
-
-
84888527471
-
Querying the Internet with PIER
-
R. Huebsch, J. M. Hellerstein, N. Lanham, B. T. Loo, S. Shenker, and I. Stoica, "Querying the Internet with PIER," in VLDB, 2003.
-
(2003)
VLDB
-
-
Huebsch, R.1
Hellerstein, J.M.2
Lanham, N.3
Loo, B.T.4
Shenker, S.5
Stoica, I.6
-
19
-
-
0001251855
-
Authentication in Distributed Systems: Theory and Practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in Distributed Systems: Theory and Practice," ACM TOCS, 1992.
-
(1992)
ACM TOCS
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
85027186168
-
Magic Sets and Other Strange Ways to Implement Logic Programs
-
F. Bancilhon, D. Maier, Y. Sagiv, and J. Ullman, "Magic Sets and Other Strange Ways to Implement Logic Programs," in SIGMOD, 1986.
-
(1986)
SIGMOD
-
-
Bancilhon, F.1
Maier, D.2
Sagiv, Y.3
Ullman, J.4
-
21
-
-
67649645600
-
-
Y. Mao, B. T. Loo, Z. Ives, and J. M. Smith, MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition, University of Pennsylvania CIS Technical Report No. MS-CIS-08-21, 2008.
-
Y. Mao, B. T. Loo, Z. Ives, and J. M. Smith, "MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition," University of Pennsylvania CIS Technical Report No. MS-CIS-08-21, 2008.
-
-
-
-
22
-
-
84869322077
-
-
Secure BGP
-
Secure BGP, http://www.ir.bbn.com/sbgp/.
-
-
-
-
23
-
-
2442603590
-
Secure Routing for Structured Peer-to-peer Overlay Networks
-
M. Castro, P. Drushel, A. Ganesh, A. Rowstron, and D. Wallach, "Secure Routing for Structured Peer-to-peer Overlay Networks," in OSDI, 2002.
-
(2002)
OSDI
-
-
Castro, M.1
Drushel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
24
-
-
0040291388
-
The Click Modular Router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, "The Click Modular Router," ACM TOCS, vol. 18(3), 2000.
-
(2000)
ACM TOCS
, vol.18
, Issue.3
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
25
-
-
34547285007
-
The Design of the Borealis Stream Processing Engine
-
Daniel J. Abadi et. al., "The Design of the Borealis Stream Processing Engine," in CIDR, 2005.
-
(2005)
CIDR
-
-
Abadi, D.J.1
et., al.2
-
26
-
-
33646580035
-
Secure context-sensitive authorization
-
K. Minami and D. Kotz, "Secure context-sensitive authorization," in PERCOM, 2005.
-
(2005)
PERCOM
-
-
Minami, K.1
Kotz, D.2
-
28
-
-
1542361932
-
Looking Up Data in P2P Systems
-
H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, "Looking Up Data in P2P Systems," Communications of the ACM, Vol. 46, No. 2, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.2
-
-
Balakrishnan, H.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
29
-
-
77749271723
-
Towards a Language and System for Secure Networking
-
M. Abadi and B. T. Loo, "Towards a Language and System for Secure Networking," in NetDB, 2007.
-
(2007)
NetDB
-
-
Abadi, M.1
Loo, B.T.2
-
30
-
-
67649663086
-
Provenance-aware Secure Networks
-
W. Zhou, E. Cronin, and B. T. Loo, "Provenance-aware Secure Networks," in NetDB, 2008.
-
(2008)
NetDB
-
-
Zhou, W.1
Cronin, E.2
Loo, B.T.3
-
31
-
-
52649140439
-
A security punctuation framework for enforcing access control on streaming data
-
R. V. Nehme, E. A. Rundensteiner, and E. Bertino, "A security punctuation framework for enforcing access control on streaming data," in ICDE, 2008.
-
(2008)
ICDE
-
-
Nehme, R.V.1
Rundensteiner, E.A.2
Bertino, E.3
-
32
-
-
67649652852
-
Specifying Access Control Policies on Data Streams
-
Barbara Carminati and Elena Ferrari and Kian-Lee Tan, "Specifying Access Control Policies on Data Streams," in DASFAA, 2007.
-
(2007)
DASFAA
-
-
Carminati, B.1
Ferrari, E.2
Tan, K.-L.3
-
33
-
-
0036040302
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet, "Analyzing security protocols with secrecy types and logic programs," in POPL, 2002.
-
(2002)
POPL
-
-
Abadi, M.1
Blanchet, B.2
-
34
-
-
0003150474
-
A model, analysis, and protocol framework for soft state-based communication
-
S. Raman and S. McCanne, "A model, analysis, and protocol framework for soft state-based communication," in SIGCOMM, 1999.
-
(1999)
SIGCOMM
-
-
Raman, S.1
McCanne, S.2
|