메뉴 건너뛰기




Volumn , Issue , 2013, Pages 25-30

Verifiable network function outsourcing: Requirements, challenges, and roadmap

Author keywords

Middlebox; Network function outsourcing (NFO); Verification

Indexed keywords

OUTSOURCING; VERIFICATION; VIRTUAL REALITY;

EID: 84893360247     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2535828.2535831     Document Type: Conference Paper
Times cited : (35)

References (29)
  • 1
    • 84893359275 scopus 로고    scopus 로고
    • Trusted Computing Group. http://www.trustedcomputinggroup.org/.
  • 3
    • 79960598786 scopus 로고    scopus 로고
    • SmartRE: An architecture for coordinated network-wide redundancy elimination
    • A. Anand, V. Sekar, and A. Akella. SmartRE: an architecture for coordinated network-wide redundancy elimination. In Proc. SIGCOMM, 2009.
    • (2009) Proc. SIGCOMM
    • Anand, A.1    Sekar, V.2    Akella, A.3
  • 5
    • 82155187185 scopus 로고    scopus 로고
    • CloudNaaS: A cloud networking platform for enterprise applications
    • T. Benson, A. Akella, A. Shaikh, and S. Sahu. CloudNaaS: a cloud networking platform for enterprise applications. In Proc. SOCC, 2011.
    • (2011) Proc. SOCC
    • Benson, T.1    Akella, A.2    Shaikh, A.3    Sahu, S.4
  • 8
  • 9
    • 84883469564 scopus 로고    scopus 로고
    • Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action
    • M. Chiosi et al. Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action. Technical report, ETSI, 2012.
    • (2012) Technical Report, ETSI
    • Chiosi, M.1
  • 11
    • 85080713142 scopus 로고    scopus 로고
    • Toward online verification of client behavior in distributed applications
    • R. A. Cochran and M. K. Reiter. Toward online verification of client behavior in distributed applications. In Proc. NDSS, 2013.
    • (2013) Proc. NDSS
    • Cochran, R.A.1    Reiter, M.K.2
  • 13
    • 0035360861 scopus 로고    scopus 로고
    • Trajectory sampling for direct traffic observation
    • June
    • N. G. Duffield and M. Grossglauser. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. Netw., 9(3):280-292, June 2001.
    • (2001) IEEE/ACM Trans. Netw. , vol.9 , Issue.3 , pp. 280-292
    • Duffield, N.G.1    Grossglauser, M.2
  • 14
    • 84883696109 scopus 로고    scopus 로고
    • FlowTags: Enforcing network-wide policies in the presence of dynamic middlebox actions
    • S. K. Fayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul. FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In Proc. HotSDN, 2013.
    • (2013) Proc. HotSDN
    • Fayazbakhsh, S.K.1    Sekar, V.2    Yu, M.3    Mogul, J.C.4
  • 19
    • 78149305172 scopus 로고    scopus 로고
    • PacketShader: A gpu-accelerated software router
    • S. Han, K. Jang, K. Park, and S. Moon. PacketShader: a gpu-accelerated software router. In Proc. SIGCOMM, 2010.
    • (2010) Proc. SIGCOMM
    • Han, S.1    Jang, K.2    Park, K.3    Moon, S.4
  • 20
    • 85014857125 scopus 로고    scopus 로고
    • Accountability in hosted virtual networks
    • E. Keller, R. B. Lee, and J. Rexford. Accountability in hosted virtual networks. In Proc. VISA, 2009.
    • (2009) Proc. VISA
    • Keller, E.1    Lee, R.B.2    Rexford, J.3
  • 21
  • 25
    • 84880861749 scopus 로고    scopus 로고
    • Verifiable resource accounting for cloud computing services
    • V. Sekar and P. Maniatis. Verifiable resource accounting for cloud computing services. In Proc. CCSW, 2011.
    • (2011) Proc. CCSW
    • Sekar, V.1    Maniatis, P.2
  • 29
    • 84893376170 scopus 로고    scopus 로고
    • Packet-dropping adversary identification for data plane security
    • X. Zhang, A. Jain, and A. Perrig. Packet-dropping adversary identification for data plane security. In Proc. CoNext, 2008.
    • (2008) Proc. CoNext
    • Zhang, X.1    Jain, A.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.