Securing Phoenix Network Coordinate System: Difference between revisions

Jump to navigation Jump to search
Line 17: Line 17:


== Reference ==
== Reference ==
* [http://www.springerlink.com/content/20qt876131833081/]
* [http://www.springerlink.com/content/20qt876131833081/]Y. Chen, X. Wang, X. Song, et al. Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. In Proc. of IFIP/TC6 Networking, 2009
* [http://planete.inria.fr/dabbous/publis/lsad06.pdf]
* [http://planete.inria.fr/dabbous/publis/lsad06.pdf] M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. Real Attacks on Virtual Networks: Vivaldi out of tune. In Proc of the ACM SIGCOMM workshop Large Scale Attack Defense, 2006.
* [http://portal.acm.org/ft_gateway.cfm?id=1368453&type=pdf]
* [http://portal.acm.org/ft_gateway.cfm?id=1368453&type=pdf] M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. Virtual Networks under Attack: Disrupting Internet Coordinate Systems. In Proc. of ACM CoNEXT, 2006.
* [http://micah.cis.upenn.edu/papers/veracity-usenix-atc09.pdf]
* [http://micah.cis.upenn.edu/papers/veracity-usenix-atc09.pdf] Micah Sherr, Matt Blaze, and Boon Thau Loo. Veracity: Practical Secure Network Coordinates via Vote-based Agreements. In Proc. of USENIX Annual Technical Conference, 2009.
* [http://www.springerlink.com/index/f348530225120185.pdf]
* [http://www.springerlink.com/index/f348530225120185.pdf] D. Saucez, B. Donnet and O. Bonaventure. A Reputation-Based Approach for Securing Vivaldi Embedding System. Proc. 13th EUNICE Open European Summer School and IFIP TC6.6 Workshop on Dependable and Adaptable Networks and Service, 2007.