Realizing the information future: the Internet and beyond
Realizing the information future: the Internet and beyond
Cryptography's role in securing the information society
Cryptography's role in securing the information society
The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Communications of the ACM
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Clarifying the fundamentals of HTTP
Proceedings of the 11th international conference on World Wide Web
Journal of Network and Systems Management
Journal of Network and Systems Management
Tussle in cyberspace: defining tomorrow's internet
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Exploring the factors affecting internet content filters acceptance
ACM SIGecom Exchanges
Economic Tussles in the Public Mobile Access Market
BT Technology Journal
A comparison of mechanisms for improving mobile IP handoff latency for end-to-end TCP
Proceedings of the 9th annual international conference on Mobile computing and networking
Linking Market Uncertainty to VoIP Service Architectures
IEEE Internet Computing
Classroom discussions: policies and responsibilities of Internet Service Providers
Proceedings of the 8th annual conference on Innovation and technology in computer science education
An open architecture for next-generation telecommunication services
ACM Transactions on Internet Technology (TOIT)
Clarifying the fundamentals of HTTP
Software—Practice & Experience - Special issue: Web technologies
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Security, Wiretapping, and the Internet
IEEE Security and Privacy
A negotiation description language
Software—Practice & Experience
'Rough Consensus and Running Code' and the Internet-OSI Standards War
IEEE Annals of the History of Computing
SVM learning of IP address structure for latency prediction
Proceedings of the 2006 SIGCOMM workshop on Mining network data
10 papers for the Ph.D. student in networking
ACM SIGCOMM Computer Communication Review
Home networking and HCI: what hath god wrought?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
DMTP: Controlling spam through message delivery differentiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Incentive-based cooperative and secure inter-personal networking
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A data-oriented (and beyond) network architecture
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Network Virtualization: A Viable Path Towards the Future Internet
Wireless Personal Communications: An International Journal
More than meets the eye: transforming the user experience of home network management
Proceedings of the 7th ACM conference on Designing interactive systems
New accounting system for the QoS-enabled multiservice internet: technical overview
International Journal of Business Information Systems
Digital rights management architectures
Computers and Electrical Engineering
Overhead and performance study of the general internet signaling transport (GIST) protocol
IEEE/ACM Transactions on Networking (TON)
Implications of Internet architecture on net neutrality
ACM Transactions on Internet Technology (TOIT)
Computer Supported Cooperative Work
A programmable overlay router for service provider innovation
Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow
Fast information processing over business networks
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
Fair bandwidth sharing between unicast and multicast flows in best-effort networks
Computer Communications
Interactive Transparent Networking: Protocol meta modeling based on EFSM
Computer Communications
An autonomic architecture to manage ubiquitous computing networks and applications
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
The Applicability of Self-Awareness for Network Management Operations
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
Trie Partitioning in distributed PC based routers
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A virtualization-based network architecture for next generation internet
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
The infrastructure problem in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Requirements for routing in the application layer
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
ICEbox: toward easy-to-use home networking
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
CellNet: a bottom-up approach to network design
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Middleware for supporting inter-organizational interactions
Future directions in distributed computing
Adaptive optimal buffer management policies for realistic DTN
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The design of an autonomic communication element to manage future internet services
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Quantitative end-to-end arguments: fundamental
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
The autonomic network architecture (ANA)
IEEE Journal on Selected Areas in Communications
A survey on the design, applications, and enhancements of application-layer overlay networks
ACM Computing Surveys (CSUR)
Towards a relation oriented service architecture
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Reinventing virtual appliances
IBM Journal of Research and Development
Content delivery networks: a bridge between emerging applications and future IP networks
IEEE Network: The Magazine of Global Internetworking
An interoperable usage management framework
Proceedings of the tenth annual ACM workshop on Digital rights management
Using strongly typed networking to architect for tussle
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks
IEEE Communications Letters
A mobility framework to improve heterogeneous wireless network services
International Journal of Ad Hoc and Ubiquitous Computing
Advancing the state of home networking
Communications of the ACM
Contribution to content delivery network analysis
AIKED'11 Proceedings of the 10th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
Fifth Generation Networking Principles for a Service Driven Future Internet Architecture
Wireless Personal Communications: An International Journal
Review and designs of federated management in future internet architectures
The future internet
ACM SIGCOMM Computer Communication Review
A domain specific language for usage management
Proceedings of the 11th annual ACM workshop on Digital rights management
Trust by workflow in autonomic communication
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
On communicating with agents on the network
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Refactoring network infrastructure to improve manageability: a case study of home networking
ACM SIGCOMM Computer Communication Review
Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID
International Journal of Grid and Utility Computing
The price of tussles: bankrupt in cyberspace?
ACM SIGMETRICS Performance Evaluation Review
Handover approaches for seamless mobility management in next generation wireless networks
Wireless Communications & Mobile Computing
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Delay Tolerant Payload Conditioning protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.02 |
This article looks at the Internet and the changing set of requirements for the Internet as it becomes more commercial, more oriented toward the consumer, and used for a wider set of purposes. We discuss a set of principles that have guided the design of the Internet, called the end-to-end arguments, and we conclude that there is a risk that the range of new requirements now emerging could have the consequence of compromising the Internet's original design principles. Were this to happen, the Internet might lose some of its key features, in particular its ability to support new and unanticipated applications. We link this possible outcome to a number of trends: the rise of new stakeholders in the Internet, in particular Internet service providers; new government interests; the changing motivations of a growing user base; and the tension between the demand for trustworthy overall operation and the inability to trust the behavior of individual users.