首页 >> 技术深度文章 >> 分类技术 >> 正文
可信网络中安全、可控可管及可生存技术研究
2008年2月27日 16:08    通信世界网    评论()    
作 者:王晟 虞红芳 许都

    [21]MASSEYD,WANG L, ZHANG B, et al. Enabling future Internet innovations through transit wire (eFIT) [EB/OL]. NSF FIND’2006 project. http://www.nets-find.net/Funded/eFIT.php.

    [22]张宏科,苏伟.新网络体系基础研究—一体化网络与普适服务 [J]. 电子学报, 2007,35(4): 593-598.

    [23]ELLISONR,FISCHER D, LINGER R, et al. Survivable network systems: An emerging discipline[R]. CMU/SEI-2001-TN-001. Pittsburgh, PA,USA: Software Engineering Institute, Carnegie Mellon University, 2001.

    [24]YURCIKW,DOSS D, KRUSE H. Survivability-over-security: Providing whole system assurance [C]//Proceedings of IEEE/SEI/CERT 3rd Information Survivability Workshop (ISW '00),Oct 24-26,2000, Boston, MA, USA .Los Alamitos, CA, USA: IEEE Computer Society, 2000:201-204.

    [25]GROVERW.Mesh-based survivable transport networks: Options and strategies for optical, MPLS, SONET and ATM networking [M]. New York, NY,USA: Prentice-Hall, 2003.

    [26]RAIS,MUKHERJEE B, DESHPANDE O. IP resilience within an autonomous system: Current approaches, challenges, and future directions [J]. IEEE Communications Magazine, 2005, 43(10): 142-149.

    [27]SHANDM.IP fast-reroute framework [EB/OL]. draft-ietf-rtgwg-ipfrr-framework-06.

    [28]KvalbeinA.,Hansen, A f, Cicic T, et al. Fast IP network recovery using multiple Routing Configurations [C]// Proceedings 25th IEEE International Conference on Computer Communications( INFOCOM 2006), Apr 23-29 ,2006, Barcelona, Spain. Piscataway, NJ,USA:IEEE ,2006:1-11.

    [29]NICOLD,SANDERS W, TRIVEDI K. Model-based evaluation: From dependability to security [J]. IEEE Transactions on Dependable and Secure Computing, 2004,1(1): 48-65.

    [30]ORTALOR,DESWARTE Y, KAANICHE M. Experimenting with quantitative evaluation tools for monitoring operational security [J]. IEEE Transactions on Software Engineering, 1999. 25(5): 633-650.

    [31]CHUC,CHU M. An integrated framework for the assessment of network operations, reliability, and security [J]. Bell Labs Technical Journal, 2004,8(4):133-152.

    [32]JHAS,SHEYNER O, WING J. Minimization and reliability analyses of attack graphs [R]. CMU-CS-02-109. Pittsburgh, PA,USA: School of Computer Science, Carnegie Mellon University,2002.

    [33]MARKOPULUA,IANNACCONE G, BHATTACHARYA S,et al. Characterization of failures in an IP backbone [C]//Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004):Vol4, Mar 7-11, 2004, Hong Kong, China. Piscataway, NJ,USA:IEEE: 2307-2317.

    [34]PUYPEB,YAN Q, DE MAESSCHALCK S. et al. Multi-layer resilience in data-centric optical networks [C] //Proceedings of SPIE Conference on Optical Transmission Systems and Equipment for WDM Networking III, Oct 25-28, 2004, Philadelphia, PA, USA. Bellingham, WA, USA:SPIE,2004: 255-267.

    [35]HUANGC,MESSIER D. A fast and scalable inter-domain MPLS protection mechanism [J]. Journal of Communications and Networks, 2004,6(1):60-67.

    作者简介:

    王晟,电子科技大学通信与信息工程学院教授、博士生导师。2005年入选教育部“新世纪优秀人才资助计划”。主要研究领域为宽带通信网络。已发表论文80余篇,其中被SCI/EI检索40余篇;申请国家发明专利10余项,已获授权3项。虞红芳,电子科技大学通信与信息工程学院副教授、博士。主要研究方向为网络可生存性、宽带网络优化设计和路由协议设计等。已在国内外主要学术刊物上发表学术论文50余篇,国际会议交流论文20余篇,其中被SCI/EI检索30余篇次;申请国家发明专利6项。许都,电子科技大学通信与信息工程学院副教授、博士。主要研究方向网络性能分析与优化、大容量交换与路由系统、网络安全体系结构等。已在国内外主要学术刊物上发表学术论文30余篇,其中被SCI/EI检索20余篇次;申请国家发明专利10项。

[1]  [2]  [3]  [4]  [5]  编 辑:张翀
关键字搜索:可信网络  生存  研究  
  [ 发 表 评 论 ]     用户昵称:   会员注册
 
 
  推 荐 新 闻
  技 术 动 态
  通 信 圈