An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Promoting the use of end-to-end congestion control in the Internet
IEEE/ACM Transactions on Networking (TON)
Trust in Cyberspace
Delayed Internet routing convergence
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Delayed Internet routing convergence
IEEE/ACM Transactions on Networking (TON)
A Service Scheduler in a Trustworthy System
ANSS '04 Proceedings of the 37th annual symposium on Simulation
TADL - An Architecture Description Language for Trustworthy Component-Based Systems
ECSA '08 Proceedings of the 2nd European conference on Software Architecture
A formal approach for the specification and verification of trustworthy component-based systems
Journal of Systems and Software
Hi-index | 0.00 |
The public telephone network (PTN) and Internet are two large and complex networked information systems (NISs). The PTN and the Internet shed light on the technical problems faced by the developers and operators of other NISs. In some ways, the two networks are very similar. No single entity owns, manages, or can even have a complete picture of either. Both networks involve large numbers of subsystems operated by different organizations. The number and intricate nature of the interfaces that exist at the boundaries of these subsystems are one source of complexity; the increasing popularity of advanced services is a second source. This article discusses vulnerabilities in the PTN and Internet, identifying ways new research might help to eliminate those vulnerabilities