A system for authenticated policy-compliant routing
نویسندگان
چکیده
منابع مشابه
Compliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams
The JPEG2000 syntax requires that any two consecutive bytes in the encrypted packet body should not be larger than 0xFF8F. This stringent requirement has plagued researchers for a few years. In this paper, we present a novel secure encryption and authentication scheme for JPEG2000 code-streams, which does not introduce superfluous JPEG2000 markers in the protected code-stream. The scheme achiev...
متن کاملPoComON∗ A POlicy-COMpliant Overlay Network
On today’s commodity internet, senders have no control over the path that their packets take beyond the first hop. This aspect of today’s internet prevents many potential network policies from being implemented. Source routing has been proposed as a mechanism to solve this problem, in which the sender chooses the path the traffic will take. However, previous approaches have either not enforced ...
متن کاملA Policy Framework for the Interface to the Routing System Draft-atlas-irs-policy-framework-01
A key aspect of the Interface to the Routing System (I2RS) is what mechanisms it includes to carry policy information and to enable policy control. This applies both in the protocol itself and in the services associated with the different components of the routing system. Similarly, the data-models associated with the services must be capable of expressing the appropriate granularity for access...
متن کاملMulti-path Routing Policy for Distributed Caching System
The massive volume of content traffic imposes serious challenges to today’s Internet. Content distribution is widely considered as a useful method of efficiently and successfully processing content traffic. To this effect, effective cache technologies are urgently required for both Internet service providers (ISPs) and Internet users. However, transmission efficiency of major methods for conten...
متن کاملA Queueing-Inventory System with Repair Center for Defective Items and One-for-One Ordering Policy
In this paper we consider a system consisting of a supplier with a single processing unit, a repair center, and a retailer with Poisson demand. We assume that the retailer applies one-for-one ordering policy with backorders for his inventory control. The retailer’s orders form a queue in the supplier processing unit. We also assume that a certain fraction of the products produced by the supplie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCOMM Computer Communication Review
سال: 2004
ISSN: 0146-4833
DOI: 10.1145/1030194.1015487