메뉴 건너뛰기




Volumn , Issue , 2013, Pages 429-440

Federated flow-based approach for privacy preserving connectivity tracking

Author keywords

Network monitoring; Outages; Privacy preservation; Secure multiparty computation; Troubleshooting

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DIAGNOSIS; ECONOMIC AND SOCIAL EFFECTS; LOSSES; OUTAGES; PROGRAM DEBUGGING;

EID: 84893415285     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2535372.2535388     Document Type: Conference Paper
Times cited : (7)

References (37)
  • 5
    • 79958004492 scopus 로고    scopus 로고
    • Semi-homomorphic encryption and multiparty computation
    • Berlin, Heidelberg Springer-Verlag
    • R. Bendlin, I. Damgård, C. Orlandi, and S. Zakarias. Semi-homomorphic encryption and multiparty computation. In Proc. EUROCRYPT'11, pages 169-188, Berlin, Heidelberg, 2011. Springer-Verlag.
    • (2011) Proc. EUROCRYPT'11 , pp. 169-188
    • Bendlin, R.1    Damgård, I.2    Orlandi, C.3    Zakarias, S.4
  • 7
    • 84893345636 scopus 로고    scopus 로고
    • Privacy-preserving distributed network troubleshooting? Bridging the gap between theory and practice
    • Dec.
    • M. Burkhart and X. Dimitropoulos. Privacy-preserving distributed network troubleshooting? bridging the gap between theory and practice. ACM Trans. Inf. Syst. Secur., 14(4):31:1-31:30, Dec. 2008.
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.14 , Issue.4 , pp. 311-3130
    • Burkhart, M.1    Dimitropoulos, X.2
  • 9
  • 10
    • 14844367057 scopus 로고    scopus 로고
    • An improved data stream summary: The count-min sketch and its applications
    • G. Cormode and S. Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55(1):58-75, 2005.
    • (2005) Journal of Algorithms , vol.55 , Issue.1 , pp. 58-75
    • Cormode, G.1    Muthukrishnan, S.2
  • 12
    • 84893398901 scopus 로고    scopus 로고
    • Extracting benefit from harm: Using malware pollution to analyze the impact of political and geophysical events on the internet
    • A. Dainotti, R. Amman, E. Aben, and K. C. Claffy. Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. SIGCOMM CCR, 42(1):31-39, 2012.
    • (2012) SIGCOMM CCR , vol.42 , Issue.1 , pp. 31-39
    • Dainotti, A.1    Amman, R.2    Aben, E.3    Claffy, K.C.4
  • 21
    • 84893401174 scopus 로고    scopus 로고
    • Passive corruption in statistical multi-party computation
    • Springer-Verlag
    • M. Hirt, C. Lucas, U. Maurer, and D. Raub. Passive corruption in statistical multi-party computation. In Proc. ICITS'12. Springer-Verlag, 2012.
    • (2012) Proc. ICITS'12
    • Hirt, M.1    Lucas, C.2    Maurer, U.3    Raub, D.4
  • 25
    • 84893416287 scopus 로고    scopus 로고
    • NANOG. http://www.nanog.org/.
  • 26
    • 84893391331 scopus 로고    scopus 로고
    • outages@outages.org
    • outages@outages.org. The outages mailinglist. http://puck.nether.net/ mailman/listinfo/outages.
    • The Outages Mailinglist
  • 29
    • 33847327063 scopus 로고    scopus 로고
    • Secure distributed data-mining and its application to large-scale network measurements
    • Jan.
    • M. Roughan and Y. Zhang. Secure distributed data-mining and its application to large-scale network measurements. SIGCOMM Comput. Commun. Rev., 36(1):7-14, Jan. 2006.
    • (2006) SIGCOMM Comput. Commun. Rev. , vol.36 , Issue.1 , pp. 7-14
    • Roughan, M.1    Zhang, Y.2
  • 30
    • 84893376957 scopus 로고    scopus 로고
    • Route Views Page. http://www.routeviews.org.
  • 31
    • 79952918906 scopus 로고    scopus 로고
    • FACT: Flow-based approach for connectivity tracking
    • Berlin, Heidelberg Springer-Verlag
    • D. Schatzmann, S. Leinen, J. Kögel, and W. Mühlbauer. FACT: flow-based approach for connectivity tracking. In Proc. PAM'11, pages 214-223, Berlin, Heidelberg, 2011. Springer-Verlag.
    • (2011) Proc. PAM'11 , pp. 214-223
    • Schatzmann, D.1    Leinen, S.2    Kögel, J.3    Mühlbauer, W.4
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov.
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, Nov. 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 36
    • 34248382818 scopus 로고    scopus 로고
    • Planetseer: Internet path failure monitoring and characterization in wide-area services
    • Berkeley, CA, USA USENIX Association
    • M. Zhang, C. Zhang, V. Pai, L. Peterson, and R. Wang. Planetseer: internet path failure monitoring and characterization in wide-area services. In Proceedings of the 6th OSDI Conference, pages 12-12, Berkeley, CA, USA, 2004. USENIX Association.
    • (2004) Proceedings of the 6th OSDI Conference , pp. 12-12
    • Zhang, M.1    Zhang, C.2    Pai, V.3    Peterson, L.4    Wang, R.5
  • 37
    • 36949036650 scopus 로고    scopus 로고
    • A light-weight distributed scheme for detecting ip prefix hijacks in real-time
    • New York, NY, USA ACM
    • C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting ip prefix hijacks in real-time. In Proceedings of the ACM SIGCOMM 2007 Conference, pages 277-288, New York, NY, USA, 2007. ACM.
    • (2007) Proceedings of the ACM SIGCOMM 2007 Conference , pp. 277-288
    • Zheng, C.1    Ji, L.2    Pei, D.3    Wang, J.4    Francis, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.