首页 >> 技术深度文章 >> 分类技术 >> 正文
可信网络中安全、可控可管及可生存技术研究
2008年2月27日 16:08    通信世界网    评论()    
作 者:王晟 虞红芳 许都

    [1]林闯,彭雪海.可信网络研究 [J]. 计算机学报, 2005, 28(5): 751-758.

    [2]CNCERT/CC2007年上半年网络安全工作报告[EB/OL]. http://www.cert.org.cn/.

    [3]沈昌祥,张焕国,冯登国, 等. 信息安全综述 [J]. 中国科学:E辑(信息科学), 2007, 37(2): 129-150.

    [4]PAXSONV.Considerations and pitfalls for conducting intrusion detection research [C]// Proceedings of the Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA2007), Jul 12-13, 2007, Lucerne, Switzerland. 2007.

    [5]BellovinSM, Clark D D, Perrig A, et al. Report of NSF workshop on a clean-slate design for the next-generation secure Internet [R]. GENI Design Document 05-05, 2005.

    [6]HELLERSTEINJ,CONDIE T, GAROFALAKIS M, et al. Public health for the Internet: Towards a new grand challenge for information management [C]//Proceedings of the 3rd Biennial Conference on Innovative Data Systems Research (CIDR'07), Jan 7-10, 2007, Asilomar, CA,USA. 2007:332-340.

    [7]SNOERENA,KOHNO T, SAVAGE S, et al. Privacy-preserving attribution and provenance [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/Privacy.php.

    [8]CHAUMD,HEYST E. Group Signatures [C]//Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Apr 8-11, 1991, Brighton, UK, Berlin, Germany: Springer-Verlag, 1991:257-265.

    [9]CASADOM,GARFINKEL T, AKELLA A, et al. SANE: A protection architecture for enterprise networks [C]//Proceedings of 15th USENIX Security Symposium, Jul 31-Aug 4, 2006 ,Vancouver, Canada. 2006:137-151.

    [10]BASAGNIS,CHLAMTAC I, SYROTIUK V, et al. A distance routing effect algorithm for mobility (DREAM) [C]//Proceedings of the 4th annual ACM/IEEE International Conference on Mobile Computing and Networking, Oct 25-30, 1998, Dallas, TX, USA . New York, NY, USA:ACM. 1998:76-84.

    [11]GRUTESERM.A geometric stack for location-aware networking [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/GeometricStack.php.

    [12]GREENBERGA,HJALMTYSSON G, MALTZ D, et al. A clean slate 4D approach to network control and management [J]. ACM Computer Communication Review, 2005,35(5): 41-54.

    [13]CLARKD,PARTRIDGE C, RAMMING J, et al. A knowledge plane for the Internet [C]//Proceedings of Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication(SIGCOMM 2003), Aug 25-29,2003, Karlsruhe, Germany. New York, NY,USA:ACM, 2003:3-10.

    [14]SHENKERS,ALLMAN M, PAXSON V. Architectural support for network trouble-shooting [EB/OL]. NSF FIND’2006. http://www.nets-find.net/Funded/ArchtSupportNet.php.

    [15]BARFORDP,BANERJEE S, ESTAN C. Design for manageability in the next generation Internet [EB/OL]. NSF FIND’2006. http://www.nets-find.net/Funded/Manageability.php.

    [16]FRANCISP,LEPREAU J. Towards complexity-oblivious network management [EB/OL]. NSF FIND’2006. http://www.nets-find.net/Funded/TowardsComplexity.php.

    [17]EUGENENGT S ,YAN H. Towards a framework for network control composition [C]//Proceedings of ACM SIGCOMM Workshop on Internet Network Management (INM’06), Sep 11,2006, Pisa,Italy.2006.

    [18]CAMPBELLA,MEER H, KOUNAVIS M, et al. A survey of programmable networks [J]. ACM Computer Communications Review, 1999,29(2) :7-23.

    [19]TURNERJ,CROWLEY P, GORINSKY S, et al. An architecture for a diversified Internet [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/DiversifiedInterent.php.

    [20]FEAMSTERN,GAO L, REXFORD J. CABO: Concurrent architectures are better than one [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/Cabo.php.

[1]  [2]  [3]  [4]  [5]  编 辑:张翀
关键字搜索:可信网络  生存  研究  
  [ 发 表 评 论 ]     用户昵称:   会员注册
 
 
  推 荐 新 闻
  技 术 动 态
  通 信 圈