Browse > Article

에이전트 기반 액티브 네트워킹 기술  

전용희 (대구카톨릭대학교 컴퓨터정보통신공학부)
장정숙 (대구카톨릭대학교 대학원)
장종수 (한국전자통신연구원 네트워크보안연구부)
손승원 (한국전자통신연구원 네트워크보안연구부)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Da Silva, S., Florissi, D. and Yemini, Y., Net Script: A Lang Uage-Based Approach to Active Networks,Technical Report, Computer Science Dept, Columbia University, January27, 1998.
2 Konstantinos Psounis, Networks: Applications, Security, Safety, and Architectures, in IEEE communications Quarter 1999.
3 Stamatis Karnouskos, 'Agent Populated Active Networks', 2nd International Conference on Advanced Communication Technology (ICACT 2000), February 16-18, 2000,
4 Stamatis Karnouskos. 'Dealingwith Denial-of-Service Attacks inAgentenabled Active and Programmable Infrastructures', 25th IEEE International Computer Softwareand Applications Conference (COM-PSAC 2001), October 8-12, 2001, Chicago, Illinois. U.S.A (ISBN0-7695-1372-7)
5 http://www.gent.org/pub/satp/palers/maf5.html
6 Menelaos K. Perdikeas, Fotis G.Chatzipapadopoulos, 'An Evaluation Study of Mobile Agent Technology:Standardization, Implementation and Evolution,' IEEE, 0-7695-0253- 9/99.pp.287-291, 1999.
7 http://www.ist-fain.org/
8 http://www.etri.re.kr
9 Yang Kun. Guo Xin, Liu Dayou, Security in Mobile System Problem sand Approaches, Department of Computer Science, JiLin University, Changchun, 130023, National Natural Science Fund and 863 high-tech Project, pp21-28
10 Tennenhouse. D., et al., 'A Surveyof Active Network Research', IEEE Communications Magazine, January1997
11 Calvert. K. et al, Architectural Framework for Active Networks Active Networks Working Group Draft, July 1999.
12 http://www.darpa.mil/ato/Programs/active-networks/actnet.htm
13 D.S. Alexander, et al. Active Protocol Network Encapsulation (ANEP). In RFC Draft, July 1997.
14 Alexander D.S., Braden B.. Gunter C.A., Jackson W.A., Keromytis A.'D.Milden G.A.. and Wetherall D.A. Active Network Encapsulation Protocol Working Group Draft, July 1997(A치 교P). Active Networks
15 http://www.ikv.de/prducts/grasshopper
16 K. Calvert, E. Zegura, and J.Sterbenz. "CANEs: A Modest Approach to Active Networking", InProceeding of IEEE Computer Communications Workshop, September 1997.
17 D. J. Wetherall, J. V. Guttag, and D. L.Tennenhouse, 'ANTS: Architecture for Building and Dynamically Deploying Network Protocols', Proc IEEE OPENARCH 98, April 1998.
18 http://www.meitca.com/HSL/Projects/Concordia
19 D. J. Wetherall and D. L. Tennen-house, 'The Active IP Option', InProceeding of 7th ACM SIG0PS European Workshop, September1996
20 David Wetherall, Ulana Legedza and John Guttag, "Introducing New Internet Services: Why and How", IEEE Network Magazine, July/August 1998
21 http://www.sds.lcs.mit.edu/activeware, http://www.netlab.cs.ntm.ernetin/cs481/ current/cs97187/an.html
22 Ulana Legedza, David Wetheralland John Guttag, 'Improving the performance of distributed applicationsusing active networks', IEEEINF0C0M'98, 1998.
23 B. Schwartz, et al., 'Smart Packets for Active Networks'. In Proceeding of IEEE Communication Surveys, First Quarter 1999.
24 Chih-Lin hu, Wen-Shyen E. Chen,'A Mobile Agent-Based Active Network Architecture', Department of Electrical Engineering National Taiwan University, IEEE 0-7695-0568-6/00, 2000
25 M. Wooldrige and N. Jennings. Intelligent Agents : Theory and Practice. 1995.
26 Dan Decasper and Bernhard Plattner. 'DAN: Distributed Code Cashing for active Networks', Proc IEEE INFOCOM 98, San Francisco CA, March/April 1998.
27 http://www.objectspace.com/voyager
28 http://www.tri.ibm.co.jp/aglets
29 Jonathan Dale, 'A Mobile Agent Architecture for distributed Information Management', 1997.
30 http://choices.cs.uiuc.edu/Security/cherubim/
31 Alexander, D.8., Arbaugh, W.A.,Hicks, M.A., Kakkar P., Keromytis A., Moore J.T., Nettles S.M., andSmith J.M., "The Switch Ware Active Network Architecture", IEEE Network-Special Issue on Active and Controllable Networks, vol. 12 no. 3, 1998.
32 Stamatis Karnouskos, 'SecurityImplications of Implementing ActiveNetwork Infrastructures using AgentTechnology', Computer Networks 36(2001) 87-100.   DOI
33 http://www.darpa.mil/ito/research
34 http://choices.cs.uiuc.edu/Security/seraphim/
35 http://www.genmaigc.com/technology/odyssey.html