메뉴 건너뛰기




Volumn 21, Issue 6, 2013, Pages 1839-1851

Minimum disclosure routing for network virtualization and its experimental evaluation

Author keywords

Network virtualization (NV); routing; secure multiparty computation

Indexed keywords

ANALYTICAL PERFORMANCE MODEL; CONVERGENCE TIME; EXPERIMENTAL EVALUATION; INFRASTRUCTURE PROVIDERS; NETWORK VIRTUALIZATION; ROUTING; ROUTING INFORMATION; SECURE MULTI-PARTY COMPUTATION;

EID: 84891628907     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2013.2238950     Document Type: Article
Times cited : (8)

References (37)
  • 3
    • 70350765000 scopus 로고    scopus 로고
    • CoreLab: An emerging network testbed employing hosted virtual machine monitor
    • Dec.
    • A. Nakao, R. Ozaki, and Y. Nishida, "CoreLab: An emerging network testbed employing hosted virtual machine monitor," in Proc. ACM ROADS, Dec. 2008, pp. 73:1-73:6.
    • (2008) Proc. ACM ROADS , pp. 731-736
    • Nakao, A.1    Ozaki, R.2    Nishida, Y.3
  • 4
    • 84876357755 scopus 로고    scopus 로고
    • How to lease the Internet in your spare time
    • Jan.
    • N. Feamster, L. Gao, and J. Rexford, "How to lease the Internet in your spare time," Comput. Commun. Rev., vol. 37, no. 1, pp. 61-64, Jan. 2007.
    • (2007) Comput. Commun. Rev. , vol.37 , Issue.1 , pp. 61-64
    • Feamster, N.1    Gao, L.2    Rexford, J.3
  • 5
    • 68949188091 scopus 로고    scopus 로고
    • Network virtualization: State of the art and research challenges
    • Jul.
    • N. Chowdhury and R. Boutaba, "Network virtualization: State of the art and research challenges," IEEE Commun. Mag., vol. 47, no. 7, pp. 20-26, Jul. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.7 , pp. 20-26
    • Chowdhury, N.1    Boutaba, R.2
  • 9
    • 84891629510 scopus 로고    scopus 로고
    • Steel in the Air, Fort Myers, FL, USA [Online]. Available:
    • Steel in the Air, Fort Myers, FL, USA, "AT&T/Cingular cell tower lease renegotiation," [Online]. Available: http://www. steelintheair.com/Cingular-and-ATT-Wireless-Cell-Tower-Lease-Negotiations.html
    • AT&T/Cingular Cell Tower Lease Renegotiation
  • 10
    • 0442281562 scopus 로고    scopus 로고
    • Best practice does not equal best strategy
    • P. Nattermann, "Best practice does not equal best strategy," McKinsey Quart., vol. 2, no. 2000, pp. 22-31, 2000.
    • (2000) McKinsey Quart. , vol.2 , Issue.2000 , pp. 22-31
    • Nattermann, P.1
  • 11
    • 39049096845 scopus 로고    scopus 로고
    • On the interaction between dynamic routing in the native and overlay layers
    • S. Seetharaman and M. Ammar, "On the interaction between dynamic routing in the native and overlay layers," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
    • (2006) Proc. IEEE INFOCOM , pp. 1-12
    • Seetharaman, S.1    Ammar, M.2
  • 12
    • 84891634420 scopus 로고    scopus 로고
    • Cisco OSPF command
    • San Jose and CA USA:Cisco Press
    • W. Parkhurst, Cisco OSPF Command and Configuration Handbook. San Jose, CA, USA: Cisco Press, 2002.
    • (2002) Configuration Handbook
    • Parkhurst, W.1
  • 13
    • 0035521411 scopus 로고    scopus 로고
    • Distance realization problems with applications to internet tomography
    • DOI 10.1006/jcss.2001.1785
    • F. Chung, M. Garrett, R. Graham, and D. Shallcross, "Distance realization problems with applications to Internet tomography," J. Comput. Syst. Sci., vol. 63, no. 3, pp. 432-448, 2001. (Pubitemid 34266035)
    • (2001) Journal of Computer and System Sciences , vol.63 , Issue.3 , pp. 432-448
    • Chung, F.1    Garrett, M.2    Graham, R.3    Shallcross, D.4
  • 15
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of cryptography
    • Cambridge, U.K.: Cambridge Univ. Press
    • O. Goldreich, Foundations of Cryptography, Volume 2, Basic Applications. Cambridge, U.K.: Cambridge Univ. Press, 2004.
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 16
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in Proc. ACM STOC, 1988, pp. 1-10.
    • (1988) Proc. ACM STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 17
    • 84891632752 scopus 로고    scopus 로고
    • Qwest BusinessMonroe and LA USA [Online] Available
    • Qwest Business,Monroe, LA, USA, "Qwest network maps," [Online]. Available: http://www.qwest-business.com/demos/network-maps. html
    • Qwest Network Maps
  • 18
    • 48649085344 scopus 로고    scopus 로고
    • Secure and flexible monitoring of virtual machines
    • B. Payne, M. Carbone, and L.Wenke, "Secure and flexible monitoring of virtual machines," in Proc. ACSAC, 2007, pp. 385-397.
    • (2007) Proc. ACSAC , pp. 385-397
    • Payne, B.1    Carbone, M.2    Wenke, L.3
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 23
    • 50449090154 scopus 로고    scopus 로고
    • [Online] Available
    • "Quagga routing suite," [Online]. Available: http://www.quagga.net/
    • Quagga Routing Suite
  • 24
  • 25
    • 33645762992 scopus 로고    scopus 로고
    • Achieving subsecond IGP convergence in large IP networks
    • P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, "Achieving subsecond IGP convergence in large IP networks," Comput. Commun. Rev., vol. 35, no. 3, pp. 35-44, 2005.
    • (2005) Comput. Commun. Rev. , vol.35 , Issue.3 , pp. 35-44
    • Francois, P.1    Filsfils, C.2    Evans, J.3    Bonaventure, O.4
  • 27
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, vol. 43, no. 3, pp. 431-473, 1996. (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 28
    • 33645361020 scopus 로고    scopus 로고
    • BGP routing policies in ISP networks
    • DOI 10.1109/MNET.2005.1541715
    • M. Caesar and J. Rexford, "BGP routing policies in ISP networks," IEEE Netw., vol. 19, no. 6, pp. 5-11, Nov.-Dec. 2005. (Pubitemid 46444788)
    • (2005) IEEE Network , vol.19 , Issue.6 , pp. 5-11
    • Caesar, M.1    Rexford, J.2
  • 29
    • 57049083569 scopus 로고    scopus 로고
    • Privacy preserving error resilient DNA searching through oblivious automata
    • J. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik, "Privacy preserving error resilient DNA searching through oblivious automata," in Proc. ACM CCS, 2007, pp. 519-528.
    • (2007) Proc. ACM CCS , pp. 519-528
    • Troncoso-Pastoriza, J.1    Katzenbeisser, S.2    Celik, M.3
  • 31
    • 0036806665 scopus 로고    scopus 로고
    • Traffic engineering with traditional IP routing protocols
    • DOI 10.1109/MCOM.2002.1039866
    • B. Fortz, J. Rexford, and M. Thorup, "Traffic engineering with traditional IP routing protocols," IEEE Commun. Mag., vol. 40, no. 10, pp. 118-124, Oct. 2002. (Pubitemid 35311955)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 118-124
    • Fortz, B.1    Rexford, J.2    Thorup, M.3
  • 32
    • 85014857125 scopus 로고    scopus 로고
    • Accountability in hosted virtual networks
    • E. Keller, R. Lee, and J. Rexford, "Accountability in hosted virtual networks," in Proc. ACM VISA, 2009, pp. 29-36.
    • (2009) Proc. ACM VISA , pp. 29-36
    • Keller, E.1    Lee, R.2    Rexford, J.3
  • 33
    • 77953691051 scopus 로고    scopus 로고
    • Preserving topology confidentiality in interdomain path computation using a path-key-based mechanism
    • Apr.
    • J. Vasseur and A. Farrel, "Preserving topology confidentiality in interdomain path computation using a path-key-based mechanism," RFC 5520, Apr. 2009.
    • (2009) RFC , vol.5520
    • Vasseur, J.1    Farrel, A.2
  • 34
    • 84891628293 scopus 로고    scopus 로고
    • 3GPP TS 23.228 V5.15.0 Jun.
    • "3GPP TS 23.228 V5.15.0," Jun. 2006.
    • (2006)
  • 36
    • 33646793331 scopus 로고    scopus 로고
    • Privacy-preserving graph algorithms in the semi-honest model
    • J. Brickell and V. Shmatikov, "Privacy-preserving graph algorithms in the semi-honest model," Lect. Notes Comput. Sci., vol. 3788, p. 236, 2005.
    • (2005) Lect. Notes Comput. Sci. , vol.3788 , pp. 236
    • Brickell, J.1    Shmatikov, V.2
  • 37
    • 33847272740 scopus 로고    scopus 로고
    • Verifying global invariants in multiprovider distributed systems
    • S. Machiraju and R. Katz, "Verifying global invariants in multiprovider distributed systems," in Proc. ACM SIGCOMM HotNets, 2004, pp. 149-154.
    • (2004) Proc. ACM SIGCOMM HotNets , pp. 149-154
    • MacHiraju, S.1    Katz, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.