End-to-end Information Flow Security Model for Software-Defined Networks
نویسندگان
چکیده
منابع مشابه
End-to-end security in active networks
............................................................................................................ 2 TABLE OF FIGURES............................................................................................. 6 ACKNOWLEDGEMENTS..................................................................................... 6 RELATED PUBLICATIONS ....................................................
متن کاملEnd-to-End Verification of Information-Flow Security for C and Assembly Programs
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today’s cybersecurity community. A promising step toward conquering this challenge is to formally verify that the end-to-end behavior of the computing system really satisfies various information-flow policies. Unfortunately, because today’s system software still consist...
متن کاملEnd-to-End Verification of Information-Flow Security for C and Assembly Programs
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today’s cybersecurity community. A promising step toward conquering this challenge is to formally verify that the end-to-end behavior of the computing system really satisfies various information-flow policies. Unfortunately, because today’s system software still consist...
متن کاملEnd-to-End Service Delivery with QoS Guarantee in Software Defined Networks
Software-Defined Network (SDN) is expected to have a significant impact on future networking. Although exciting progress has been made toward realizing SDN, application of this new networking paradigm in the future Internet to support end-to-end QoS provisioning faces some new challenges. The autonomous network domains coexisting in the Internet and the diverse user applications deployed upon t...
متن کاملEnd-to-End Security of Information Flow in Web-based Applications
ACKNOWLEDGEMENTS I have relied on guidance, support and advice of many people in producing this dissertation. First and foremost, I am deeply indebted to my advisor Dr. Calton Pu, for his guidance and support throughout the Ph.D. process. His knowledge and vision proved to be instrumental in my development as a researcher. I am also grateful for his flexibility in allowing me to explore differe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Modeling and Analysis of Information Systems
سال: 2016
ISSN: 2313-5417,1818-1015
DOI: 10.18255/1818-1015-2015-6-735-749