End-to-end Information Flow Security Model for Software-Defined Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-end security in active networks

............................................................................................................ 2 TABLE OF FIGURES............................................................................................. 6 ACKNOWLEDGEMENTS..................................................................................... 6 RELATED PUBLICATIONS ....................................................

متن کامل

End-to-End Verification of Information-Flow Security for C and Assembly Programs

Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today’s cybersecurity community. A promising step toward conquering this challenge is to formally verify that the end-to-end behavior of the computing system really satisfies various information-flow policies. Unfortunately, because today’s system software still consist...

متن کامل

End-to-End Verification of Information-Flow Security for C and Assembly Programs

Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today’s cybersecurity community. A promising step toward conquering this challenge is to formally verify that the end-to-end behavior of the computing system really satisfies various information-flow policies. Unfortunately, because today’s system software still consist...

متن کامل

End-to-End Service Delivery with QoS Guarantee in Software Defined Networks

Software-Defined Network (SDN) is expected to have a significant impact on future networking. Although exciting progress has been made toward realizing SDN, application of this new networking paradigm in the future Internet to support end-to-end QoS provisioning faces some new challenges. The autonomous network domains coexisting in the Internet and the diverse user applications deployed upon t...

متن کامل

End-to-End Security of Information Flow in Web-based Applications

ACKNOWLEDGEMENTS I have relied on guidance, support and advice of many people in producing this dissertation. First and foremost, I am deeply indebted to my advisor Dr. Calton Pu, for his guidance and support throughout the Ph.D. process. His knowledge and vision proved to be instrumental in my development as a researcher. I am also grateful for his flexibility in allowing me to explore differe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Modeling and Analysis of Information Systems

سال: 2016

ISSN: 2313-5417,1818-1015

DOI: 10.18255/1818-1015-2015-6-735-749