A system for authenticated policy-compliant routing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams

The JPEG2000 syntax requires that any two consecutive bytes in the encrypted packet body should not be larger than 0xFF8F. This stringent requirement has plagued researchers for a few years. In this paper, we present a novel secure encryption and authentication scheme for JPEG2000 code-streams, which does not introduce superfluous JPEG2000 markers in the protected code-stream. The scheme achiev...

متن کامل

PoComON∗ A POlicy-COMpliant Overlay Network

On today’s commodity internet, senders have no control over the path that their packets take beyond the first hop. This aspect of today’s internet prevents many potential network policies from being implemented. Source routing has been proposed as a mechanism to solve this problem, in which the sender chooses the path the traffic will take. However, previous approaches have either not enforced ...

متن کامل

A Policy Framework for the Interface to the Routing System Draft-atlas-irs-policy-framework-01

A key aspect of the Interface to the Routing System (I2RS) is what mechanisms it includes to carry policy information and to enable policy control. This applies both in the protocol itself and in the services associated with the different components of the routing system. Similarly, the data-models associated with the services must be capable of expressing the appropriate granularity for access...

متن کامل

Multi-path Routing Policy for Distributed Caching System

The massive volume of content traffic imposes serious challenges to today’s Internet. Content distribution is widely considered as a useful method of efficiently and successfully processing content traffic. To this effect, effective cache technologies are urgently required for both Internet service providers (ISPs) and Internet users. However, transmission efficiency of major methods for conten...

متن کامل

A Queueing-Inventory System with Repair Center for Defective Items and One-for-One Ordering Policy

In this paper we consider a system consisting of a supplier with a single processing unit, a repair center, and a retailer with Poisson demand. We assume that the retailer applies one-for-one ordering policy with backorders for his inventory control. The retailer’s orders form a queue in the supplier processing unit. We also assume that a certain fraction of the products produced by the supplie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGCOMM Computer Communication Review

سال: 2004

ISSN: 0146-4833

DOI: 10.1145/1030194.1015487