메뉴 건너뛰기




Volumn , Issue , 2015, Pages 545-550

Security-awareness in network virtualization: A classified overview

Author keywords

Network Virtualization; Security; Virtual Network Embedding

Indexed keywords

EMBEDDINGS; VIRTUAL REALITY; VIRTUALIZATION;

EID: 84925356681     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MASS.2014.59     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 2
    • 18144370444 scopus 로고    scopus 로고
    • Overcoming the internet impasse through virtualization
    • April
    • T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the internet impasse through virtualization," Computer, vol. 38, no. 4, pp. 34-41, April 2005.
    • (2005) Computer , vol.38 , Issue.4 , pp. 34-41
    • Anderson, T.1    Peterson, L.2    Shenker, S.3    Turner, J.4
  • 5
    • 84883086265 scopus 로고    scopus 로고
    • Resolve the virtual network embedding problem: A column generation approach
    • Q. Hu, Y. Wang, and X. Cao, "Resolve the virtual network embedding problem: A column generation approach," in INFOCOM, 2013 Proceedings IEEE, pp. 410-414.
    • INFOCOM, 2013 Proceedings IEEE , pp. 410-414
    • Hu, Q.1    Wang, Y.2    Cao, X.3
  • 7
    • 84887282657 scopus 로고    scopus 로고
    • Virtual network with security guarantee embedding algorithms
    • November
    • C. Xing, J. Lan, and Y. Hu, "Virtual network with security guarantee embedding algorithms," Journal of Computers, vol. 8, no. 11, pp. 2782-2787, November 2013.
    • (2013) Journal of Computers , vol.8 , Issue.11 , pp. 2782-2787
    • Xing, C.1    Lan, J.2    Hu, Y.3
  • 9
    • 70349682522 scopus 로고    scopus 로고
    • Virtual network embedding with coordinated node and link mapping
    • April
    • N. K. Chowdhury, M. R. Rahman, and R. Boutaba, "Virtual network embedding with coordinated node and link mapping," in Proceedings of IEEE INFOCOM'09, April 2009, pp. 783-791.
    • (2009) Proceedings of IEEE INFOCOM'09 , pp. 783-791
    • Chowdhury, N.K.1    Rahman, M.R.2    Boutaba, R.3
  • 13
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud! exploring information leakage in thirdparty compute clouds
    • S. Jha and A. Keromytis, Eds. ACM Press, Nov.
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud! Exploring information leakage in thirdparty compute clouds," in Proceedings of CCS 2009, S. Jha and A. Keromytis, Eds. ACM Press, Nov. 2009, pp. 199-212.
    • (2009) Proceedings of CCS 2009 , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 15
    • 77953683060 scopus 로고    scopus 로고
    • A new approach to optical networks security: Attack-aware routing and wavelength assignment
    • June
    • N. Skorin-Kapov, J. Chen, and L. Wosinska, "A new approach to optical networks security: Attack-aware routing and wavelength assignment," IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp. 750-760, June 2010.
    • (2010) IEEE/ACM Transactions on Networking , vol.18 , Issue.3 , pp. 750-760
    • Skorin-Kapov, N.1    Chen, J.2    Wosinska, L.3
  • 19
    • 84936944100 scopus 로고    scopus 로고
    • Integrity verification of k-means clustering outsourced to infrastructure as a service (iaas) providers
    • R. Liu, P. Mordohai, W. H. Wang, and H. Xiong, "Integrity verification of k-means clustering outsourced to infrastructure as a service (iaas) providers," in SIAM International Conference on Data Mining'13, pp. 632-640.
    • SIAM International Conference on Data Mining'13 , pp. 632-640
    • Liu, R.1    Mordohai, P.2    Wang, W.H.3    Xiong, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.