메뉴 건너뛰기




Volumn , Issue , 2012, Pages 537-543

Security issues in network virtualization for the future Internet

Author keywords

future Internet; isolation; network attacks; network security; network virtualization

Indexed keywords

COOPERATIVE ENVIRONMENT; FUTURE INTERNET; ISOLATION; KEY TECHNOLOGIES; LOGICAL NETWORK; NETWORK ATTACK; NETWORK INFRASTRUCTURE; NETWORK VIRTUALIZATION; POTENTIAL ATTACK; SECURE NETWORKS; SECURITY ISSUES; VIRTUAL NETWORK OPERATORS; VIRTUAL NETWORKS;

EID: 84859902620     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCNC.2012.6167481     Document Type: Conference Paper
Times cited : (13)

References (37)
  • 1
    • 44249122520 scopus 로고    scopus 로고
    • Internet clean-slate design: What and why?
    • Jul.
    • A. Feldmann, "Internet clean-slate design: what and why?" SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 59-64, Jul. 2007.
    • (2007) SIGCOMM Computer Communication Review , vol.37 , Issue.3 , pp. 59-64
    • Feldmann, A.1
  • 2
    • 18144370444 scopus 로고    scopus 로고
    • Overcoming the Internet impasse through virtualization
    • Apr
    • T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the Internet impasse through virtualization," Computer, vol. 38, no. 4, pp. 34-41, Apr 2005.
    • (2005) Computer , vol.38 , Issue.4 , pp. 34-41
    • Anderson, T.1    Peterson, L.2    Shenker, S.3    Turner, J.4
  • 4
    • 70349682522 scopus 로고    scopus 로고
    • Virtual network embedding with coordinated node and link mapping
    • IEEE, april
    • N. Chowdhury, M. Rahman, and R. Boutaba, "Virtual network embedding with coordinated node and link mapping," in INFOCOM 2009, IEEE, april 2009, pp. 783-791.
    • (2009) INFOCOM 2009 , pp. 783-791
    • Chowdhury, N.1    Rahman, M.2    Boutaba, R.3
  • 7
    • 84859900032 scopus 로고    scopus 로고
    • National Science Foundation
    • Global Environment for Network Innovation, National Science Foundation, http://www.geni.net/.
  • 9
    • 84871557657 scopus 로고    scopus 로고
    • University of Utah
    • Network Emulation Testbed, University of Utah, http://www.emulab.net/.
    • Network Emulation Testbed
  • 16
    • 84859884818 scopus 로고    scopus 로고
    • Bad ISPs, VUZE, http://wiki.vuze.com/w/Bad-ISPs.
    • Bad ISPs
  • 18
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • ser. CCS '09. New York, NY, USA: ACM, Online. Available
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 199-212. [Online]. Available: http://doi.acm.org/10.1145/1653662.1653687
    • (2009) Proceedings of the 16th ACM Conference on Computer and Communications Security , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 19
    • 77249132188 scopus 로고    scopus 로고
    • A survey of network virtualization
    • Apr.
    • N. M. M. K. Chowdhury and R. Boutaba, "A survey of network virtualization," Computer Networks, vol. 54, no. 5, pp. 862-876, Apr. 2010.
    • (2010) Computer Networks , vol.54 , Issue.5 , pp. 862-876
    • Chowdhury, N.M.M.K.1    Boutaba, R.2
  • 23
    • 65249152909 scopus 로고    scopus 로고
    • Virtual routers on the move: Live router migration as a network-management primitive
    • August Online. Available
    • Y. Wang, E. Keller, B. Biskeborn, J. van der Merwe, and J. Rexford, "Virtual routers on the move: live router migration as a network-management primitive," SIGCOMM Comput. Commun. Rev., vol. 38, pp. 231-242, August 2008. [Online]. Available: http://doi.acm.org/10.1145/1402946.1402985
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , pp. 231-242
    • Wang, Y.1    Keller, E.2    Biskeborn, B.3    Van Der Merwe, J.4    Rexford, J.5
  • 25
    • 70849107663 scopus 로고    scopus 로고
    • Exploiting Live Virtual Machine Migration
    • Washington DC, February
    • J. Oberheide, E. Cooke, and F. Jahanian, "Exploiting Live Virtual Machine Migration," in BlackHat DC Briefings, Washington DC, February 2008.
    • (2008) BlackHat DC Briefings
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3
  • 31
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • ser. STOC '09. New York, USA: ACM, Online. Available
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st annual ACM symposium on Theory of computing, ser. STOC '09. New York, USA: ACM, 2009, pp. 169-178. [Online]. Available: http://doi.acm.org/10.1145/1536414.1536440
    • (2009) Proceedings of the 41st Annual ACM Symposium on Theory of Computing , pp. 169-178
    • Gentry, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.