• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 18
Next 10 →

FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions

by Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu, Jeffrey C. Mogul, Google Inc
"... Past studies show that middleboxes are a critical piece of network infrastructure for providing security and performance guarantees. Unfortunately, the dynamic and traffic-dependent modifications induced by middleboxes make it difficult to reason about the correctness of network-wide policy enforcem ..."
Abstract - Cited by 37 (7 self) - Add to MetaCart
enforcement (e.g., access control, accounting, and performance diagnostics). Using practical application scenarios, we argue that we need a flow tracking capability to ensure consistent policy enforcement in the presence of such dynamic traffic modifications. To this end, we propose FlowTags, an extended SDN

Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags

by Seyed Kaveh, Fayazbakhsh Luis, Chiang Vyas, Sekar Minlan, Yu Jeffrey, C. Mogul
"... Middleboxes provide key security and performance guarantees in networks. Unfortunately, the dynamic traf-fic modifications they induce make it difficult to reason about network management tasks such as access control, accounting, and diagnostics. This also makes it difficult to integrate middleboxes ..."
Abstract - Add to MetaCart
middleboxes into SDN-capable networks and leverage the benefits that SDN can offer. In response, we develop the FlowTags architecture. FlowTags-enhanced middleboxes export tags to provide the necessary causal context (e.g., source hosts or in-ternal cache/miss state). SDN controllers can configure the tag

USENIX Association 11th USENIX Symposium on Networked Systems Design and Implementation 533 Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags

by Seyed Kaveh, Fayazbakhsh Luis, Chiang Vyas, Sekar Minlan, Yu Jeffrey, C. Mogul
"... Middleboxes provide key security and performance guarantees in networks. Unfortunately, the dynamic traf-fic modifications they induce make it difficult to reason about network management tasks such as access control, accounting, and diagnostics. This also makes it difficult to integrate middleboxes ..."
Abstract - Add to MetaCart
middleboxes into SDN-capable networks and leverage the benefits that SDN can offer. In response, we develop the FlowTags architecture. FlowTags-enhanced middleboxes export tags to provide the necessary causal context (e.g., source hosts or in-ternal cache/miss state). SDN controllers can configure the tag

Enforcing Policies in Pervasive Environments

by Vlad Korolev, Lalana Kagal, Anupam Joshi - In Mobile and Ubiquitous Systems, MobiQuitous-2004 , 2004
"... This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive environment. The security infrastructure primarily consists of two parts, the policy engine and the policy enforcement mechanism. Each mobile ..."
Abstract - Cited by 14 (2 self) - Add to MetaCart
mobile device within a pervasive environment is equipped with its own policy enforcement mechanism and is responsible for protecting its resources. A mobile device consults the nearest policy server, notifies its current state including its present user, network presence, other accessible devices

copyright by

by Chien-liang Fok, Chris Gill, Christine Julien, Caitlin Kelleher , 2009
"... Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applicati ..."
Abstract - Add to MetaCart
applications, developing software for these types of networks is extremely dffcult, preventing their wide-spread use. Three primary challenges are (1) the high level of dynamics within the network in terms of changing wireless links and node hardware con gurations, (2) the wide variety of hardware present

c Copyright by

by Paul Sivilotti, Dong Xuan, Xiaodong Zhang, Hongwei Zhang
"... Messaging is a basic service in sensornets. Yet the unique system and application prop-erties of sensornets pose substantial challenges for the messaging design: Firstly, dynamic wireless links, constrained resources, and application diversity challenge the architecture and protocol design of sensor ..."
Abstract - Add to MetaCart
Messaging is a basic service in sensornets. Yet the unique system and application prop-erties of sensornets pose substantial challenges for the messaging design: Firstly, dynamic wireless links, constrained resources, and application diversity challenge the architecture and protocol design

Raj Jain! Routing vs Switching

by Raj Jain, Raj Jain Overview, Raj Jain, Label Stacks
"... 1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP ..."
Abstract - Add to MetaCart
1. Networking trends 2. QoS over data networks 3. Label switching 4. Gigabit, 10 Gb Ethernet, RPR 5. Storage area networks 6. IP over DWDM 7. Wireless 8. Voice over IP

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

Routing and Broadcasting in Ad-Hoc Networks

by Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Prof Dr, T. Braun, Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Von Frutigen, Prof Dr, T. Braun
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract - Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present

© Author(s) 2015. CC Attribution 3.0 License.

by T. J. Troy, M. Konar, V. Srinivasan, S. Thompson , 2015
"... www.hydrol-earth-syst-sci.net/19/3667/2015/ doi:10.5194/hess-19-3667-2015 ..."
Abstract - Add to MetaCart
www.hydrol-earth-syst-sci.net/19/3667/2015/ doi:10.5194/hess-19-3667-2015
Next 10 →
Results 1 - 10 of 18
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University