The next-generation internet: Unsafe at any speed?

KP Birman - Computer, 2000 - ieeexplore.ieee.org
Speed alone will not make future Internet applications secure. I propose a new networking
isolation capability, termed a virtual overlay network (VON). Such software-based virtual …

On the design and implementation of IP-over-P2P overlay virtual private networks

K Subratie, S Aditya, V Daneshmand… - IEICE Transactions …, 2020 - search.ieice.org
The success and scale of the Internet and its protocol IP has spurred emergent distributed
technologies such as fog/edge computing and new application models based on distributed …

Technology challenges for virtual overlay networks

KP Birman - IEEE Transactions on Systems, Man, and …, 2001 - ieeexplore.ieee.org
An emerging generation of mission-critical networked applications is placing demands on
the Internet protocol suite that go well beyond the properties they were designed to …

[PDF][PDF] Overlay-friendly native network: a contradiction in terms

S Seetharaman, M Ammar - Proceedings of ACM HotNets-IV, 2005 - Citeseer
It is a widely accepted notion that the native layer of the current Internet has begun to
stagnate in terms of the services offered. Consequently, overlay networks have gained …

[PDF][PDF] Virtual Internets

J Touch, Y Wang, L Eggert - ISI Technical Report ISI-TR-2002-558, 2002 - eija.org
A Virtual Internet is a network of IP-tunneled links interconnecting virtual routers and virtual
hosts, providing full Internet capabilities at a virtual layer. They support protection …

[PDF][PDF] Project JXTA virtual network

B Traversat, M Abdelaziz, M Duigou, JC Hugly… - Sun Microsystems …, 2002 - Citeseer
Abstract Project JXTA [1, 2, 3] is an open-source project that defines a set of protocols for ad
hoc, pervasive, peer-to-peer computing. The Project JXTA protocols establish a virtual …

Mediated overlay services (MOSES): Network security as a composable service

S Sidiroglou, A Stavrou… - 2007 IEEE Sarnoff …, 2007 - ieeexplore.ieee.org
In recent years, organizations have been shifting focus to their core business competencies,
and reducing total cost of ownership (TCO) associated with training and management of …

[PDF][PDF] OverDoSe: A generic DDoS protection service using an overlay network

E Shi, I Stoica, D Andersen, A Perrig - 2006 - reports-archive.adm.cs.cmu.edu
We present the design and implementation of OverDoSe, an overlay network offering
generic DDoS protection for targeted sites. OverDoSe clients and servers are isolated at the …

EdgeVPN: Self-organizing layer-2 virtual edge networks

K Subratie, S Aditya, RJ Figueiredo - Future Generation Computer Systems, 2023 - Elsevier
The advent of virtualization and cloud computing has fundamentally changed how
distributed applications and services are deployed and managed. With the proliferation of …

[PDF][PDF] A virtual internet architecture

J Touch, Y Wang, L Eggert, G Finn - ISI Technical Report ISI-TR-2003-570, 2003 - Citeseer
A Virtual Internet (VI) is an IP network composed of tunneled links among a set of virtual
routers and virtual hosts. The architecture, like its virtual memory counterpart, provides an …