[PDF][PDF] Security architecture and protocols for overlay network services

M Srivatsa - 2007 - Citeseer
The recent years have witnessed a wide spread proliferation of the Internet to encompass
multiple autonomous organizations, heterogeneous platforms and mobile and wireless …

Secure overlay network design

L Li, M Mahdian, VS Mirrokni - Algorithmica, 2010 - Springer
Due to the increasing security threats on the Internet, new overlay network architectures
have been proposed to secure privileged services. In these architectures, the application …

[PDF][PDF] Towards Scalable and Robust Overlay Networks.

B Awerbuch, C Scheideler - IPTPS, 2007 - ris.uni-paderborn.de
Every peer-to-peer system is based on some overlay network connecting its peers. Many of
the overlay network concepts proposed in the scientific community are based on the concept …

Mediated overlay services (MOSES): Network security as a composable service

S Sidiroglou, A Stavrou… - 2007 IEEE Sarnoff …, 2007 - ieeexplore.ieee.org
In recent years, organizations have been shifting focus to their core business competencies,
and reducing total cost of ownership (TCO) associated with training and management of …

Next generation overlay networks: security, trust, and deployment challenges

J Paillissé Vilanova - 2021 - upcommons.upc.edu
Overlay networks are a technique to build a new network on top of an existing one. They are
a key tool to add functionality to existing networks, and are used in different layers of the …

Secure interoperable architecture construction for overlay networks

P Jyothirmai, JS Raj - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks
to address the technical issues in heterogeneous networks that may lack continuous …

Secure overlay network design

L Li, M Mahdian, VS Mirrokni - … Conference, AAIM 2006, Hong Kong, China …, 2006 - Springer
Due to the increasing security threats in the Internet, new overlay network architectures have
been proposed to secure privileged services. In these architectures, the application servers …

An identity-based approach to secure P2P applications with Likir

LM Aiello, M Milanesio, G Ruffo… - Peer-to-Peer Networking …, 2011 - Springer
Structured overlay networks are highly susceptible to attacks aimed at subverting their
structure or functionalities. Although many secure architectural design proposals have been …

[PDF][PDF] Security issues in structured P2P overlay networks

M Vestola - Technical Reports in Computer Science and …, 2010 - cse.tkk.fi
Nowadays, P2P networks are used for many purposes, such as files sharing, instant
message communication and distributed computing. Popular services such as Skype, Bit …

Vulnerabilities and security threats in structured overlay networks: A quantitative analysis

M Srivatsa, L Liu - 20th Annual Computer Security Applications …, 2004 - ieeexplore.ieee.org
A number of recent applications have been built on distributed hash tables (DHTs) based
overlay networks. Almost all DHT-based schemes employ a tight deterministic data …