作 者:王晟 虞红芳 许都
[1]林闯,彭雪海.可信网络研究 [J]. 计算机学报, 2005, 28(5): 751-758.
[2]CNCERT/CC2007年上半年网络安全工作报告[EB/OL]. http://www.cert.org.cn/.
[3]沈昌祥,张焕国,冯登国, 等. 信息安全综述 [J]. 中国科学:E辑(信息科学), 2007, 37(2): 129-150.
[4]PAXSONV.Considerations and pitfalls for conducting intrusion detection research [C]// Proceedings of the Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA2007), Jul 12-13, 2007, Lucerne, Switzerland. 2007.
[5]BellovinSM, Clark D D, Perrig A, et al. Report of NSF workshop on a clean-slate design for the next-generation secure Internet [R]. GENI Design Document 05-05, 2005.
[6]HELLERSTEINJ,CONDIE T, GAROFALAKIS M, et al. Public health for the Internet: Towards a new grand challenge for information management [C]//Proceedings of the 3rd Biennial Conference on Innovative Data Systems Research (CIDR'07), Jan 7-10, 2007, Asilomar, CA,USA. 2007:332-340.
[7]SNOERENA,KOHNO T, SAVAGE S, et al. Privacy-preserving attribution and provenance [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/Privacy.php.
[8]CHAUMD,HEYST E. Group Signatures [C]//Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Apr 8-11, 1991, Brighton, UK, Berlin, Germany: Springer-Verlag, 1991:257-265.
[9]CASADOM,GARFINKEL T, AKELLA A, et al. SANE: A protection architecture for enterprise networks [C]//Proceedings of 15th USENIX Security Symposium, Jul 31-Aug 4, 2006 ,Vancouver, Canada. 2006:137-151.
[10]BASAGNIS,CHLAMTAC I, SYROTIUK V, et al. A distance routing effect algorithm for mobility (DREAM) [C]//Proceedings of the 4th annual ACM/IEEE International Conference on Mobile Computing and Networking, Oct 25-30, 1998, Dallas, TX, USA . New York, NY, USA:ACM. 1998:76-84.
[11]GRUTESERM.A geometric stack for location-aware networking [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/GeometricStack.php.
[12]GREENBERGA,HJALMTYSSON G, MALTZ D, et al. A clean slate 4D approach to network control and management [J]. ACM Computer Communication Review, 2005,35(5): 41-54.
[13]CLARKD,PARTRIDGE C, RAMMING J, et al. A knowledge plane for the Internet [C]//Proceedings of Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication(SIGCOMM 2003), Aug 25-29,2003, Karlsruhe, Germany. New York, NY,USA:ACM, 2003:3-10.
[14]SHENKERS,ALLMAN M, PAXSON V. Architectural support for network trouble-shooting [EB/OL]. NSF FIND’2006. http://www.nets-find.net/Funded/ArchtSupportNet.php.
[15]BARFORDP,BANERJEE S, ESTAN C. Design for manageability in the next generation Internet [EB/OL]. NSF FIND’2006. http://www.nets-find.net/Funded/Manageability.php.
[16]FRANCISP,LEPREAU J. Towards complexity-oblivious network management [EB/OL]. NSF FIND’2006. http://www.nets-find.net/Funded/TowardsComplexity.php.
[17]EUGENENGT S ,YAN H. Towards a framework for network control composition [C]//Proceedings of ACM SIGCOMM Workshop on Internet Network Management (INM’06), Sep 11,2006, Pisa,Italy.2006.
[18]CAMPBELLA,MEER H, KOUNAVIS M, et al. A survey of programmable networks [J]. ACM Computer Communications Review, 1999,29(2) :7-23.
[19]TURNERJ,CROWLEY P, GORINSKY S, et al. An architecture for a diversified Internet [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/DiversifiedInterent.php.
[20]FEAMSTERN,GAO L, REXFORD J. CABO: Concurrent architectures are better than one [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/Cabo.php.