Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A survey of programmable networks
ACM SIGCOMM Computer Communication Review
IWAN '99 Proceedings of the First International Working Conference on Active Networks
PromethOS: A Dynamically Extensible Router Architecture Supporting Explicit Routing
IWAN '02 Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks
Component-Based Deployment and Management of Services in Active Networks
IWAN '02 Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks
A Service Deployment Architecture for Heterogenous Active Networks Nodes
SMARTNET '02 Proceedings of the IFIP TC6 WG6.7 Seventh International Conference on Intelligence in Networks: Smart Networks
Compiling with proofs
Active networking: one view of the past, present, and future
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Component-based execution environments of network elements and a protocol for their configuration
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A secure active network environment architecture: realization in SwitchWare
IEEE Network: The Magazine of Global Internetworking
Self-contextual network management system
International Journal of Internet Protocol Technology
Management and performance of virtual and execution environments in FAIN
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
Hi-index | 0.24 |
Programmable and active networking principles provide a basis for a flexible and extensible network element architecture. Such architecture enables provision of various services in the network for its users but raises many security concerns and security becomes a key issue in such system. Based on description of the system, possible threats, high level security architecture goals and issues we propose a flexible and general security architecture which was designed and implemented in the context of the Future Active Ip Networks [FAIN project home page. URL http://www.ist-fain.org] project. Initial evaluation shows that strong security in such system is possible and that we have achieved most of our goals. The security architecture itself is general; we have applied it to three types of nodes developed and to one pure active networking approach.