메뉴 건너뛰기




Volumn 60, Issue 4, 2012, Pages 2001-2012

Designing router scheduling policies: A privacy perspective

Author keywords

Privacy; queuing; scheduling policy design; side channel attack; timing side channel

Indexed keywords

DYNAMIC PROGRAMS; HIGHLY-CORRELATED; LEGITIMATE USERS; MYOPIC POLICY; OPTIMAL POLICIES; PRECISE MODELING; PRIVACY PRESERVING; QUEUING; ROUTER SCHEDULING; SCHEDULING POLICIES; SCHEDULING POLICY DESIGN; SHARED RESOURCES; SIDE CHANNEL ATTACK; SIDE-CHANNEL; STATE-SPACE; TRAFFIC PATTERN; USER PRIVACY; WAITING TIME;

EID: 84858309174     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2011.2182348     Document Type: Review
Times cited : (17)

References (25)
  • 1
    • 19544369316 scopus 로고    scopus 로고
    • An empirical evaluation of widearea internet bottlenecks
    • M. Crovella, Ed., New York
    • A. Akella, S. Seshan, and A. Shaikh, "An empirical evaluation of widearea internet bottlenecks," in Proc. ACM SIGCOMM Conf. Internet Measure. (IMC), M. Crovella, Ed., New York, 2003, pp. 101-114.
    • (2003) Proc. ACM SIGCOMM Conf. Internet Measure. (IMC) , pp. 101-114
    • Akella, A.1    Seshan, S.2    Shaikh, A.3
  • 3
    • 33746053876 scopus 로고    scopus 로고
    • Privacy vulnerabilities in encrypted HTTP streams
    • [Online]. Available
    • G. Bissias, M. Liberatore,D. Jensen, and B. Levine, "Privacy vulnerabilities in encrypted HTTP streams," Privacy Enhancing Technol., pp. 1-11, 2006 [Online]. Available: http://dx.doi.org/10.1007/11767831-1
    • (2006) Privacy Enhancing Technol. , pp. 1-11
    • Bissias, G.1    Jensen, M.2    Liberatore, D.3    Levine, B.4
  • 4
    • 34547350876 scopus 로고    scopus 로고
    • Inferring the source of encrypted HTTP connections
    • New York, [Online]. Available:
    • M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS '06), New York, 2006, pp. 255-263 [Online]. Available: http://dx.doi.org/10. 1145/1180405.1180437
    • (2006) Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS '06) , pp. 255-263
    • Liberatore, M.1    Levine, B.N.2
  • 7
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and tradeoffs in anonymity providing systems
    • ser. Lecture Notes in Computer Sci.new York: Springer
    • A. Back, U. Möller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," in Information Hiding, ser. Lecture Notes in Computer Sci.. New York: Springer, 2001, vol. 2137, pp. 245-247.
    • (2001) Information Hiding , vol.2137 , pp. 245-247
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 10
    • 54249091264 scopus 로고    scopus 로고
    • Don't clog the queue! Circuit clogging andmitigation in P2P anonymity schemes
    • G. Tsudik, Ed. Berlin, Germany: Springer-Verlag, [Online]. Available:
    • J. Mclachlan and N. Hopper, "Don't clog the queue! Circuit clogging andmitigation in P2P anonymity schemes," in Financial Cryptography and Data Security, G. Tsudik, Ed. Berlin, Germany: Springer-Verlag, 2008, pp. 31-46 [Online]. Available: http://dx.doi.org/10.1007/978-3- 540-85230-8-3
    • (2008) Financial Cryptography and Data Security , pp. 31-46
    • Mclachlan, J.1    Hopper, N.2
  • 12
    • 79959957319 scopus 로고    scopus 로고
    • Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • K. Zhang and X. Wang, "Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems," in USENIX Secur., 2009.
    • (2009) USENIX Secur.
    • Zhang, K.1    Wang, X.2
  • 13
    • 2442569400 scopus 로고    scopus 로고
    • Inter-packet delay based correlation for tracing encrypted connections through stepping stones
    • ser. Lecture Notes in Computer Sci., Springer. Oct
    • X. Wang, D. Reeves, and S. F. Wu, "Inter-packet delay based correlation for tracing encrypted connections through stepping stones," in Proc. 7th Eur. Symp. Res. Comput. Secur., Oct. 2002, vol. 2502, ser. Lecture Notes in Computer Sci., Springer.
    • (2002) Proc. 7th Eur. Symp. Res. Comput. Secur. , vol.2502
    • Wang, X.1    Reeves, D.2    Wu, S.F.3
  • 14
    • 27944440026 scopus 로고    scopus 로고
    • The traffic analysis of continuous-time mixes
    • D. Martin andA. Serjantov, Eds., Berlin/Heidelberg/New York, May, ser. Lecture Notes in Computer Sci., Springer
    • G. Danezis, "The traffic analysis of continuous-time mixes," in Workshop on Privacy Enhancing Technologies, D. Martin andA. Serjantov, Eds., Berlin/Heidelberg/New York, May 2004, vol. 3424, ser. Lecture Notes in Computer Sci., pp. 35-50, Springer.
    • (2004) Workshop on Privacy Enhancing Technologies , vol.3424 , pp. 35-50
    • Danezis, G.1
  • 15
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • H. Federrath, Ed. New York: Springer, Jul
    • J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues, and open problems," in Designing Privacy Enhancing Technologies, ser. Lecture Notes in Computer Sci., H. Federrath, Ed. New York: Springer, Jul. 2000, vol. 2009, pp. 10-29.
    • (2000) Designing Privacy Enhancing Technologies, ser. Lecture Notes in Computer Sci. , vol.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 16
    • 77955359942 scopus 로고    scopus 로고
    • A low-cost side channel traffic analysis attack in packet networks
    • Cape Town, South Africa, [Online]. Available
    • S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "A low-cost side channel traffic analysis attack in packet networks," in Proc. IEEE ICC 2010-Communi. Inf. Syst. Secur. Symp., Cape Town, South Africa, 2010 [Online]. Available: http://www.ifp.illinois. edu/~kadloor1/kadloorICC2010.pdf
    • (2010) Proc. IEEE ICC 2010-Communi. Inf. Syst. Secur. Symp.
    • Kadloor, S.1    Gong, X.2    Kiyavash, N.3    Tezcan, T.4    Borisov, N.5
  • 21
    • 0026000660 scopus 로고
    • A calculus for network delay. I. Network elements in isolation
    • Jan. [Online]. Available
    • R. L. Cruz, "A calculus for network delay. I. Network elements in isolation," IEEE Trans. Inf. Theory vol. 37, no. 1, pp. 114-131, Jan. 1991 [Online]. Available: http://dx.doi.org/10.1109/18.61109
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.1 , pp. 114-131
    • Cruz, R.L.1
  • 22
    • 84858322405 scopus 로고    scopus 로고
    • Linux Advanced Routing & Traffic Control HOWTO Online publication Linux Advanced Routing & Traffic Control Apr. 2004 [Online]. Available
    • B. Hubert, T. Graf, G. Maxwell, R. Van Mook, M. Van Oosterhout, P. B. Schroeder, J. Spaans, and P. Larroy, Linux Advanced Routing & Traffic Control HOWTO, Online publication, Linux Advanced Routing & Traffic Control, Apr. 2004 [Online]. Available: http://lartc.org/lartc.pdf
    • Hubert, B.1    Graf, T.2    Maxwell, G.3    Van Mook, R.4    Van Oosterhout, M.5    Schroeder, P.B.6    Spaans, J.7    Larroy, P.8
  • 23
    • 0031191180 scopus 로고    scopus 로고
    • Traffic models in broadband networks
    • Jul
    • A. Adas, "Traffic models in broadband networks," IEEE Commun. Mag., vol. 35, no. 7, pp. 82-89, Jul. 1997.
    • (1997) IEEE Commun. Mag. , vol.35 , Issue.7 , pp. 82-89
    • Adas, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.