Secure Resilient Edge Cloud Designed Network

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Resilient Routing: A Framework for Resilient Network Architectures

A common paradigm for a network service architecture is to provide a number of different services or applications in which all of them share resources; the routing framework provides the best path to all services. A simple twist to this basic notion is if we were to architect in a way to virtualize the network so that different services are clustered into different virtual, adaptive partitions ...

متن کامل

Safe and Secure Execution at the Network Edge: A Framework for Coordinating Cloud, Fog, and Edge

System design where cyber-physical applications are securely coordinated from the cloud may simplify the development process. However, all private data are then pushed to these remote ‘swamps’, and human users lose the actual control as compared to when the applications are executed directly on their devices. At the same time, computing at the network edge is still lacking support for such stra...

متن کامل

Secure and Resilient Cloud Computing for the Department of Defense

Imagine a military commander who urgently needs a specialized computing capability to analyze new intelligence, surveillance , and reconnaissance (ISR) data and integrate those data with existing ISR information. The commander directs his information technology (IT) staff and developers to design this capability. The staff quickly provision computing hardware from a Department of Defense (DoD) ...

متن کامل

Secure Network Solutions for Enterprise Cloud Services

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...

متن کامل

Intrusion-Resilient Secure Channels

We propose a new secure communication primitive called an Intrusion-Resilient Channel (IRC) that limits the damage resulting from key exposures and facilitates recovery. We define security against passive but mobile and highly adaptive adversaries capable of exposing even expired past secrets. We describe an intuitive channel construction using (as a black box) existing public key cryptosystems...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Communications

سال: 2020

ISSN: 0916-8516,1745-1345

DOI: 10.1587/transcom.2019nri0002