Sciweavers

2904 search results - page 169 / 581
» Internet Infrastructure Security
Sort
View
NOSSDAV
2005
Springer
15 years 9 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
POLICY
2004
Springer
15 years 9 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
DSN
2002
IEEE
15 years 8 months ago
Detection of Invalid Routing Announcement in the Internet
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
SWS
2006
ACM
15 years 9 months ago
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
In this paper we propose a security architecture for Virtual Organizations for businesses. The Virtual Organizations we consider are based on web service technology to address int...
Rafael Deitos, Florian Kerschbaum, Philip Robinson
TON
2012
13 years 6 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta