A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mediated overlay services (MOSES): Network security as a composable service
2007
2007 IEEE Sarnoff Symposium
MOSES is roughly modeled on the web services framework. In addition to ease-ofdeployment, MOSES allows for economies of scale and a reduction to the total cost of ownership. ...
However, the current paradigm of outsourced managed security service providers (MSSPs) is often difficult to transition to, offers little control to the organization, does not allow "best of breed" composition ...
MOSES is roughly modeled on the web services framework. ...
doi:10.1109/sarnof.2007.4567338
fatcat:ahbxgobpizedbplefcgyy262ta
Services organisation in IoT: mixing Orchestration and Choreography
2018
2018 Global Information Infrastructure and Networking Symposium (GIIS)
But it lacks a commonly adopted architecture, able to deal with its important heterogeneity and its constraints. The major trend in IoT Applications conception is based on a centralized architecture. ...
However, a distributed approach can be imagined. The distributed architecture, called Choreography, can offer some solutions for interoperability and security, which are important issues of the IoT. ...
In IoT SOA approach, the distributed architecture is a Choreography.
A. Distributing the control The Automated WSAN is based on a distributed architecture. ...
doi:10.1109/giis.2018.8635748
dblp:conf/giis/CherrierL18
fatcat:c6vtovfukre4poxzsmkqszgeqe
VANETs and Internet of Things (IoT): A Discussion
2018
Indonesian Journal of Electrical Engineering and Computer Science
This paper also would like to address the importance of IoT based on VANET in traffic control management system to cope up with the new wireless technology era. ...
Section I of this paper provides a brief explanation on VANETs and IoT, section II discusses the main challenges suffered by VANETs and IoT, section III covers on the existing applications of VANETs and ...
A Congestion Control System Based on VANET for Small Length Road Using the structure of BUS-VANET. ...
doi:10.11591/ijeecs.v12.i1.pp218-224
fatcat:qmv43rqbibcgzlk23ulxn22fju
STUDY ON SECURITY AND QUALITY OF SERVICE IMPLEMENTATIONS IN P2P OVERLAY NETWORK FOR EFFICIENT CONTENT DISTRIBUTION
2014
International Journal of Research in Engineering and Technology
Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organization nodes organize itself in a dynamic way. ...
This enables malicious nodes to launch man-inthe-middle or denial-of-service attacks and many security related attacks. ...
Enhances the service provisioning and has real-time control over the flow prioritization. 4. ...
doi:10.15623/ijret.2014.0304081
fatcat:lhin4gxxvbddhol5ela2s3jluy
Network neutrality: Avoiding the extremes
2008
2008 46th Annual Allerton Conference on Communication, Control, and Computing
This proposal is based on the fact that current technology permits a reliable estimate of ISPs' installed (and activated) capacity. ...
The x-network creates better delineated property rights for the ISPs, which improve their incentives to (i) experiment with providing enhanced quality of service, (ii) introduce novel products which require ...
Our technology-based proposal gives a regulator the means to achieve his objectives by imposing capacity-based constraints on ISPs. ...
doi:10.1109/allerton.2008.4797680
fatcat:u2y7hwzxefe33kzrajogqs7rfa
Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast
2009
IEEE INFOCOM Workshops 2009
Multicast services raise significant operational and security challenges not only when deployed on the Internet layer, but also in overlay networks. ...
Large P2P groups as emerging from IPTV applications may be abused by unwanted traffic or denial of service attacks through amplified flooding. ...
Nevertheless, efficient group services via multicast on the Internet layer are not globally provided, but remain restricted to walled domains. ...
doi:10.1109/infcomw.2009.5072175
fatcat:7gykvauwmrbcnaqs3e7bld7e3u
An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol
2015
International Journal of Computer Applications
This paper mainly focus on understanding the changing trends of usage of cloud computing platform for various services, fundamental research approaches towards cloud security and finally need of requirements ...
The level based services makes the higher possibilities of availability, scalability, collaborative in most cost effective way. ...
Out of this, there are 147 Journals based on security issues of Internet-of-Things. ...
doi:10.5120/ijca2015907114
fatcat:z7bxshcyhbg5zkt7vb5ur7qkla
PacketCloud
2013
Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture - MobiArch '13
We have implemented a proof-of-concept prototype of PacketCloud based on the MobilityFirst architecture. ...
This paper proposes PacketCloud, a cloudlet-based open platform to host elastic in-network services. ...
In general, these services can either enhance the user experience while surfing the Internet, or optimize the traffic in the network. ...
doi:10.1145/2505906.2505910
dblp:conf/mobiarch/ChenLCLYB13
fatcat:pg5xdkvrwna5tpmprf7nnvre5i
Framework for Access Policy for Boosting Secure Communication at SDN in FIA
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Hence, in this aspect, the software-defined network could offer a significant security solution on the top of future internet architecture. ...
Cross-Scripting Attack is one such rising security concern for future internet architecture that is found very less investigated in existing times. ...
work carried out by Alshra et al.[21]introduced, security approach based on the implementation of the isolated hardware device with the SDN system to prevent controller component from a packet injection ...
doi:10.35940/ijitee.d1529.029420
fatcat:x3aerm6phbaq7o2f5ke7zikvl4
Security-as-a-Service from Clouds: A Comprehensive Analysis
2013
International Journal of Computer Applications
The securityas-a-service model can also enhance functionality of existing on-premise implementations by working as a hybrid solution. ...
In Security-as-a-service model the focus is on security provided as cloud services; i.e. security delivered through the cloud instead of on-premise security solutions. ...
Functionality of existing on-premise implementations are being enhanced by using security-as-a-service as a hybrid solution. ...
doi:10.5120/11374-6642
fatcat:blfmq5bhmbfhfgwfjpyhhu54hq
Multidomain SDN-Based Gateways and Border Gateway Protocol
2022
Journal of Computer Networks and Communications
In this review, an investigation is provided on using the SDN paradigm to enhance multidomain traffic management and control and to optimize BGP operation. ...
The flexibility afforded by the Internet architecture ensures that timely changes to the network topology can occur without centralized control. ...
Acknowledgments is study was supported by the Interior Ministry of Saudi Arabia and the Saudi Arabia Cultural Mission. e authors would like to thank Mr. Hoang Do and Dr. Franciscus X.A. ...
doi:10.1155/2022/3955800
fatcat:c2vbh54f65b27hhnf7fflvyjeq
An Architecture for Hierarchical Software-Defined Vehicular Networks
2017
IEEE Communications Magazine
As one of the significant parts for Internet of Everything (IoE), vehicular networks provide network services for things in intelligent transport systems. ...
In vehicular networks, vehicle can communicate with vehicles, pedestrians and infrastructures (Internet) by exploiting vehicle to everything (V2X) technologies. ...
Acknowledgements This work was supported by NSFC under Grant No. 61971028. ...
doi:10.1109/mcom.2017.1601105
fatcat:aqxe2dv64fftxlbpr32gduomv4
Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure
[chapter]
2012
IFIP Advances in Information and Communication Technology
Though, the proposed scheme is implemented with a Eucalyptus framework, it may work well for other Cloud platforms. It can serve as model to study the behavior of NIDS for distributed environment. ...
Noah Guilbault and Ratan Guha [6] shows a way for designing and implementing distributed grid based IDS using virtual servers deployed on Amazon's Elastic Compute Cloud service. Aman Bakshi et al. ...
By using this, a user can open or close ports to control the inbound or outbound network traffic over it. ...
doi:10.1007/978-3-642-29852-3_6
fatcat:ptudrjrmhrex7pmhoc6c4kbkf4
Future vision of globally harmonized national airspace system with concepts of operations beyond year 2020
2003
22nd Digital Avionics Systems Conference Proceedings (Cat No 03CH37449) DASC-03
flight planning independent of look ahead times; 4) flexible sector boundaries based on equitable workload; and 5) a universal information service assuring uniformity and security of real time information ...
This paper presents a vision of future NAS and operational concepts for year 2020 and beyond based on a number of new paradigms that will provide globally harmonized service to conventional aircraft, uninhabited ...
Workload Flexible sector boundaries will be established based on a uniform number of flights simultaneously handled by each controller to equitably distribute workload among most controllers. ...
doi:10.1109/dasc.2003.1245832
fatcat:vk6gv5jwpncsrdou4cngjqawfq
Global Service Provider Strategies and Networking Alternatives
2004
Information Resources Management Journal
It discusses strategic planning for the provision of new data and Internet services, and assesses alternative network designs and technologies to provide optimized solutions and service delivery. ...
MDU) markets; identification of the market and cost synergies for combining voice and IP services on common carrier facilities; and comparison of leasing versus building alternatives for metropolitan transport ...
There are market place factors such as Internet growth, new IP services, voice and data convergence, non-traditional competitors, and global expansion. ...
doi:10.4018/irmj.2004010102
fatcat:u22hjtfhxnf5lngmijsul6zrze
« Previous
Showing results 1 — 15 out of 15,725 results