عرض عادي

SCION: A Secure Internet Architecture / by Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat.

بواسطة:المساهم (المساهمين):نوع المادة : نصنصاللغة: الإنجليزية السلاسل:Information Security and Cryptographyالناشر:Cham : Springer International Publishing : Imprint: Springer, 2017الطبعات:1st ed. 2017وصف:xx, 432 pages: illustrations; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9783319670805
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.C643 P477 2017
المحتويات:
Part I: SCION Overview -- Introduction -- Isolation Domains -- Part II: SCION Details -- Network Control Plane -- Network Data Plane -- Authentication -- ISD Coordination -- Name Resolution -- Part III: Analysis and Evaluation -- Security Analysis -- Modeling Energy Consumption of a SCION-Enabled Network -- Part IV: Deployment and Operation -- Deployment -- Operation -- Part V: Low-Level Details -- Packet Formats -- Configuration File Formats -- Cryptographic Algorithms -- Border Router.
ملخص:This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.C643 P477 2017 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30030000002847
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.C643 P477 2017 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30030000002848

Part I: SCION Overview -- Introduction -- Isolation Domains -- Part II: SCION Details -- Network Control Plane -- Network Data Plane -- Authentication -- ISD Coordination -- Name Resolution -- Part III: Analysis and Evaluation -- Security Analysis -- Modeling Energy Consumption of a SCION-Enabled Network -- Part IV: Deployment and Operation -- Deployment -- Operation -- Part V: Low-Level Details -- Packet Formats -- Configuration File Formats -- Cryptographic Algorithms -- Border Router.

This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة