A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Protecting Free Expression Online with Freenet
IEEE Internet Computing
Scalable application layer multicast
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Lessons Learned in Implementing and Deploying Crypto Software
Proceedings of the 11th USENIX Security Symposium
Proceedings of the First International Workshop on Information Hiding
Making gnutella-like P2P systems scalable
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A Dynamic Trust Model for Mobile Ad Hoc Networks
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Secure Enhancement Scheme for Routing Protocol in Mobile Ad Hoc Networks
ICDCSW '05 Proceedings of the Third International Workshop on Mobile Distributed Computing - Volume 06
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
A Novel Scheme on Building a Trusted IP Routing Infrastructure
ICNS '06 Proceedings of the International conference on Networking and Services
BASE: an incrementally deployable mechanism for viable IP spoofing prevention
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)
ICN '07 Proceedings of the Sixth International Conference on Networking
Network Neutrality versus Internet Trustworthiness?
IEEE Security and Privacy
The (in)completeness of the observed internet AS-level structure
IEEE/ACM Transactions on Networking (TON)
Constraint-based routing in the internet: Basic principles and recent research
IEEE Communications Surveys & Tutorials
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
Resilient self-organizing overlay networks for security update delivery
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
As threats on the Internet become increasingly sophisticated, we now recognize the value in controlling the routing of data in a manner that ensures security. However, few technical means for achieving this goal exist. In this paper we propose and design a system that allows users to specify regions of the Internet they wish their data to avoid. Using our system, data will either arrive at the destination along a path that avoids the specified regions, or no avoiding path exists. Beyond the design, we discuss the deployment, performance and security issues of this system, along with alternative approaches that could be used.