198
edits
Line 11: | Line 11: | ||
In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design. | In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design. | ||
There are some existing NC security solutions [4][5] proposed in Vivaldi NC system, which could be our good reference. | |||
== Reference == | |||
[http://www.springerlink.com/content/20qt876131833081/] | |||
[planete.inria.fr/dabbous/publis/lsad06.pdf] | |||
[portal.acm.org/ft_gateway.cfm?id=1368453&type=pdf] | |||
[micah.cis.upenn.edu/papers/veracity-usenix-atc09.pdf] | |||
[www.springerlink.com/index/f348530225120185.pdf] |
edits