語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ null ]
切換:
標籤
|
MARC模式
|
ISBD
Security architecture and protocols ...
~
Srivatsa, Mudhakar.
FindBook
Google Book
Amazon
博客來
Security architecture and protocols for overlay network services.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security architecture and protocols for overlay network services./
作者:
Srivatsa, Mudhakar.
面頁冊數:
236 p.
附註:
Adviser: Ling Liu.
Contained By:
Dissertation Abstracts International68-07B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3271595
ISBN:
9780549112457
Security architecture and protocols for overlay network services.
Srivatsa, Mudhakar.
Security architecture and protocols for overlay network services.
- 236 p.
Adviser: Ling Liu.
Thesis (Ph.D.)--Georgia Institute of Technology, 2007.
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics.
ISBN: 9780549112457Subjects--Topical Terms:
626642
Computer Science.
Security architecture and protocols for overlay network services.
LDR
:03253nam 2200277 a 45
001
941033
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549112457
035
$a
(UMI)AAI3271595
035
$a
AAI3271595
040
$a
UMI
$c
UMI
100
1
$a
Srivatsa, Mudhakar.
$3
1265173
245
1 0
$a
Security architecture and protocols for overlay network services.
300
$a
236 p.
500
$a
Adviser: Ling Liu.
500
$a
Source: Dissertation Abstracts International, Volume: 68-07, Section: B, page: 4608.
502
$a
Thesis (Ph.D.)--Georgia Institute of Technology, 2007.
520
$a
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics.
520
$a
This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network.
590
$a
School code: 0078.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2
$a
Georgia Institute of Technology.
$3
696730
773
0
$t
Dissertation Abstracts International
$g
68-07B.
790
$a
0078
790
1 0
$a
Liu, Ling,
$e
advisor
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3271595
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9111007
電子資源
11.線上閱覽_V
電子書
EB W9111007
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入
(1)帳號:一般為「身分證號」;外籍生或交換生則為「學號」。 (2)密碼:預設為帳號末四碼。
帳號
.
密碼
.
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)