• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,197
Next 10 →

Internet Infrastructure

by K. U. Leuven
"... Electronic mail systems are one of the oldest generic services. They became very popular in the early seventies. They are useful as soon as the computer is a multi-user system. You do not need to have a network. Of course, with the venue of the Internet and the exploded requirements for communicatio ..."
Abstract - Add to MetaCart
Electronic mail systems are one of the oldest generic services. They became very popular in the early seventies. They are useful as soon as the computer is a multi-user system. You do not need to have a network. Of course, with the venue of the Internet and the exploded requirements

Internet Infrastructure

by Frederick T Sheldon , John Mark Weber , Seong-Moo Yoo , W David Pan
"... Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of ..."
Abstract - Add to MetaCart
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis

The Geography of the Internet Infrastructure in Europe

by Emmanouil Tranos
"... This PhD research is concerned with the analysis of the Internet infrastructure supply across the European cities and the results that this allocation may have for the economic development of the cities. This research’s main assumption is that the Internet is first and foremost an infrastructure whi ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
This PhD research is concerned with the analysis of the Internet infrastructure supply across the European cities and the results that this allocation may have for the economic development of the cities. This research’s main assumption is that the Internet is first and foremost an infrastructure

Internet Infrastructure Security: A Taxonomy

by Anirban Chakrabarti, G. Manimaran - IEEE Network , 2002
"... The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber terrorism demand immediate solutions for securing the Internet infrastructure. So far, the research in Internet security primarily focused on securing the information rather than securing the infrastructure ..."
Abstract - Cited by 51 (2 self) - Add to MetaCart
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber terrorism demand immediate solutions for securing the Internet infrastructure. So far, the research in Internet security primarily focused on securing the information rather than securing

Interactive Informatics on Internet Infrastructure

by F. Zhao, V. R. Vemuri, S. F. Wu, F. Xue, S. J. B. Yoo
"... Abstract — We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, such as defending against the unwanted traffic as well as diagnosing the network. We present the Distributed Deni ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, such as defending against the unwanted traffic as well as diagnosing the network. We present the Distributed

Systems and Internet Infrastructure Security

by Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger
"... Mobile phone security is a relatively new field that is gather-ing momentum in the wake of rapid advancements in phone system technology. Mobile phones are now becoming so-phisticated smart phones that provide services beyond ba-sic telephony, such as supporting third-party applications. Such third- ..."
Abstract - Add to MetaCart
Mobile phone security is a relatively new field that is gather-ing momentum in the wake of rapid advancements in phone system technology. Mobile phones are now becoming so-phisticated smart phones that provide services beyond ba-sic telephony, such as supporting third-party applications. Such third-party applications may be security-critical, such as mobile banking, or may be untrusted applications, such as downloaded games. Our goal is to protect the integrity of such critical applications from potentially untrusted func-tionality, but we find that existing mandatory access con-trol approaches are too complex and do not provide formal integrity guarantees. In this work, we leverage the sim-plicity inherent to phone system environments to develop a compact SELinux policy that can be used to justify the integrity of a phone system using the Policy Reduced In-tegrity Measurement Architecture (PRIMA) approach. We show that the resultant policy enables systems to be proven secure to remote parties, enables the desired functionality for installing and running trusted programs, and the resul-tant SELinux policy is over 90 % smaller in size. We envision that this approach can provide an outline for how to build high integrity phone systems.

The Economic Geography of Internet Infrastructure in

by Greenstein Shane M , 2004
"... Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen der unter ..."
Abstract - Add to MetaCart
Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen der unter

Systems and Internet Infrastructure Security

by Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
"... Abstract—Namespaces are fundamental to computing systems. Each namespace maps the names that clients use to retrieve resources to the actual resources themselves. However, the indirection that namespaces provide introduces avenues of attack through the name resolution process. Adversaries can trick ..."
Abstract - Add to MetaCart
Abstract—Namespaces are fundamental to computing systems. Each namespace maps the names that clients use to retrieve resources to the actual resources themselves. However, the indirection that namespaces provide introduces avenues of attack through the name resolution process. Adversaries can trick programs into accessing unintended resources by changing the binding between names and resources and by using names whose target resources are ambiguous. In this paper, we explore whether a unified system approach may be found to prevent many name resolution attacks. For this, we examine attacks on various namespaces and use these to derive invariants to defend against these attacks. Four prior techniques are identified that enforce aspects of name resolution, so we explore how these techniques address the proposed invariants. We find that each of these techniques are incomplete in themselves, but a combination could provide effective enforcement of the invariants. We implement a prototype system that can implement these techniques for the Linux filesystem namespace, and show that invariant rules specific to each, individual program system call can be enforced with a small overhead (less than 3%), indicating that fine-grained name resolution enforcement may be practical. I.

Censorship and Co-option of the Internet Infrastructure

by Michael Bailey, Craig Labovitz
"... Over a few short years, the Internet has grown to play an integral part of daily economic, social, and political life in most countries. From the Egyptian “Velvet Revolution ” to the last US presidential campaign, Internet communication shapes public opinion and fosters social change. But despite it ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
, enterprises, and governments have always placed restrictions on end-user communication to meet social or legal goals we argue recent years have seen the beginning of a new trend—the co-option of the Internet infrastructure itself to affect large-scale censorship. In this paper, we use Internet routing

Internet Indirection Infrastructure

by Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana - In Proceedings of ACM SIGCOMM , 2002
"... Attempts to generalize the Internet's point-to-point communication abstraction to provide services like multicast, anycast, and mobility have faced challenging technical problems and deployment barriers. To ease the deployment of such services, this paper proposes an overlay-based Internet Indi ..."
Abstract - Cited by 396 (26 self) - Add to MetaCart
Attempts to generalize the Internet's point-to-point communication abstraction to provide services like multicast, anycast, and mobility have faced challenging technical problems and deployment barriers. To ease the deployment of such services, this paper proposes an overlay-based Internet
Next 10 →
Results 1 - 10 of 7,197
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University