Seminar on Internet Technologies (Summer 2010): Difference between revisions

Ychen1 (talk | contribs)
 
(22 intermediate revisions by 4 users not shown)
Line 8: Line 8:
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=59364&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=59364&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|The seminar is ongoing but '''you can still take part'''. If you are interested in a topic please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information.}}


==Course description==
==Course description==
Line 24: Line 27:


==Schedule==
==Schedule==
* TBA
* <strike>Thursday, '''8 April 2010, 16.15 - 17.15''': First general meeting. Introduction to the course and open questions.</strike>
* Tuesday, '''1 June 2010, 14.00 - 16.15''': Presentations.
** 14.00 - 14.45: Twitter: a popular microblogging tool
** 14.45 - 15.30: User behavior in Online Social Networks
** 15.30 - 16.15: Security threats of Online Social Networks
* Thursday, '''30 September 2010''': Deadline for turning in the reports.


== Topics ==
== Topics ==
Line 36: Line 44:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| <strike>Securing Media Transport Protocols</strike>
| Securing Media Transport Protocols
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]
|-
|-
| State-of-the-art and deployment scenarios for IPv6
| Congestion Exposure, A study of its pros and cons
| Mayutan Arumaithurai
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://www.cisco.com/en/US/docs/ios/solutions_docs/ipv6/IPv6dswp.html]
| [http://bobbriscoe.net/projects/refb/]
|-
| Net neutrality: A study of fairness on the internet
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]
|-
|-
| <strike>Traffic Localization in P2P Networks</strike>
| LinkedIN: A study of the popular business oriented social networking site.
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://www.linkedin.com/]
|-
| Traffic Localization in P2P Networks
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
Line 51: Line 67:
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
|-
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://avispa-project.org/]
|-
|-
| Distributed Hash Tables - Usage, properties and future development
| Distributed Hash Tables - Usage, properties and future development
Line 60: Line 80:
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf]
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf]
|-
|-
| Twitter: a popular microblogging tool
| <strike>Twitter: a popular microblogging tool</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://portal.acm.org/citation.cfm?id=1348556] [http://an.kaist.ac.kr/~sbmoon/paper/intl-conf/2010-www-twitter.pdf]
| [http://portal.acm.org/citation.cfm?id=1348556] [http://an.kaist.ac.kr/~sbmoon/paper/intl-conf/2010-www-twitter.pdf] [http://www.iptps.org/papers-2009/sandler.pdf]
|-
| <strike>User behavior in Online Social Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]
|-
| <strike>Security threats of Online Social Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]
|-
| Security and Privacy in Delay Tolerant Networks
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf][https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]
|-
| Security Design in Network Coordinate Systems
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
 
|}
|}


Line 126: Line 163:
* '''Deadline: End of the semester.'''
* '''Deadline: End of the semester.'''


The report is the main part of your work. It must be between 12 and page of content (not including table of content, bibliography and such) and comprehensively cover your topic.
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.


=== 6. Block meetings ===
=== 6. Block meetings ===