Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
Computer Networks(2)
2014 IEEE Global Communications Conference, GLOBECOM 2014(1)
2014 International Conference on Smart Communications in Network Technologies, SaCoNeT 2014(1)
2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016(1)
DRCN 2014 - Proceedings, 10th International Conference on Design of Reliable Communication Networks(1)
A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing
ArticleAbstract: The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol in the Internet, thuPalabras claves:BGP, BGPSEC, Inter-domain, internet, routing, securityAutores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusDiagnosis of route leaks among autonomous systems in the Internet
Conference ObjectAbstract: Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was dPalabras claves:Autores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusOffloading personal security applications to the Network Edge: A mobile user case scenario
Conference ObjectAbstract: This paper discusses some challenges that user mobility imposes over the user-centric protection modPalabras claves:fog computing, mobility, NFV, Offloading, SDN, security, VirtualizationAutores:D Montero, Diego Montero, Serral-Gracià R.Fuentes:googlerraaescopusSecuring the LISP map registration process
Conference ObjectAbstract: The motivation behind the Locator/Identifier Separation Protocol (LISP) has shifted over time from rPalabras claves:internet, LISP, Loc/ID split, routing, securityAutores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusSelf-reliant detection of route leaks in inter-domain routing
ArticleAbstract: Route leaks are among the several inter-domain routing anomalies that have the potential to cause laPalabras claves:BGP, Inter-domain, internet, reliability, routing, securityAutores:Diego Montero, Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusVirtualized Security at the Network Edge: A User-Centric Approach
ArticleAbstract: The current device-centric protection model against security threats has serious limitations. On onePalabras claves:Autores:Basile C., Bosco F., Charalambides S., Ciaccia F., Diego Montero, Georgiades M., Jacquin L., Kuusijärvi J., Lioy A., Nemirovsky M., Pastor A., Risso F., Sassu R., Serral-Gracià R., Shaw A., Yannuzzi M.Fuentes:googlescopusRoute leak detection using real-time analytics on local BGP information
Conference ObjectAbstract: A route leak can be defined as a security gap that occurs due to the infringement of the routing polPalabras claves:BGP, Inter-domain routing, Route leaks, securityAutores:Diego Montero, Masip-Bruin X., Ramirez W., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopusRoute leak identification: A step toward making inter-domain routing more reliable
Conference ObjectAbstract: Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce largePalabras claves:Autores:Diego Montero, Masip-Bruin X., Serral-Gracià R., Siddiqui M.S., Yannuzzi M.Fuentes:googlescopus