에이전트 기반 액티브 네트워킹 기술 |
전용희
(대구카톨릭대학교 컴퓨터정보통신공학부)
장정숙 (대구카톨릭대학교 대학원) 장종수 (한국전자통신연구원 네트워크보안연구부) 손승원 (한국전자통신연구원 네트워크보안연구부) |
1 | Da Silva, S., Florissi, D. and Yemini, Y., Net Script: A Lang Uage-Based Approach to Active Networks,Technical Report, Computer Science Dept, Columbia University, January27, 1998. |
2 | Konstantinos Psounis, Networks: Applications, Security, Safety, and Architectures, in IEEE communications Quarter 1999. |
3 | Stamatis Karnouskos, 'Agent Populated Active Networks', 2nd International Conference on Advanced Communication Technology (ICACT 2000), February 16-18, 2000, |
4 | Stamatis Karnouskos. 'Dealingwith Denial-of-Service Attacks inAgentenabled Active and Programmable Infrastructures', 25th IEEE International Computer Softwareand Applications Conference (COM-PSAC 2001), October 8-12, 2001, Chicago, Illinois. U.S.A (ISBN0-7695-1372-7) |
5 | http://www.gent.org/pub/satp/palers/maf5.html |
6 | Menelaos K. Perdikeas, Fotis G.Chatzipapadopoulos, 'An Evaluation Study of Mobile Agent Technology:Standardization, Implementation and Evolution,' IEEE, 0-7695-0253- 9/99.pp.287-291, 1999. |
7 | http://www.ist-fain.org/ |
8 | http://www.etri.re.kr |
9 | Yang Kun. Guo Xin, Liu Dayou, Security in Mobile System Problem sand Approaches, Department of Computer Science, JiLin University, Changchun, 130023, National Natural Science Fund and 863 high-tech Project, pp21-28 |
10 | Tennenhouse. D., et al., 'A Surveyof Active Network Research', IEEE Communications Magazine, January1997 |
11 | Calvert. K. et al, Architectural Framework for Active Networks Active Networks Working Group Draft, July 1999. |
12 | http://www.darpa.mil/ato/Programs/active-networks/actnet.htm |
13 | D.S. Alexander, et al. Active Protocol Network Encapsulation (ANEP). In RFC Draft, July 1997. |
14 | Alexander D.S., Braden B.. Gunter C.A., Jackson W.A., Keromytis A.'D.Milden G.A.. and Wetherall D.A. Active Network Encapsulation Protocol Working Group Draft, July 1997(A치 교P). Active Networks |
15 | http://www.ikv.de/prducts/grasshopper |
16 | K. Calvert, E. Zegura, and J.Sterbenz. "CANEs: A Modest Approach to Active Networking", InProceeding of IEEE Computer Communications Workshop, September 1997. |
17 | D. J. Wetherall, J. V. Guttag, and D. L.Tennenhouse, 'ANTS: Architecture for Building and Dynamically Deploying Network Protocols', Proc IEEE OPENARCH 98, April 1998. |
18 | http://www.meitca.com/HSL/Projects/Concordia |
19 | D. J. Wetherall and D. L. Tennen-house, 'The Active IP Option', InProceeding of 7th ACM SIG0PS European Workshop, September1996 |
20 | David Wetherall, Ulana Legedza and John Guttag, "Introducing New Internet Services: Why and How", IEEE Network Magazine, July/August 1998 |
21 | http://www.sds.lcs.mit.edu/activeware, http://www.netlab.cs.ntm.ernetin/cs481/ current/cs97187/an.html |
22 | Ulana Legedza, David Wetheralland John Guttag, 'Improving the performance of distributed applicationsusing active networks', IEEEINF0C0M'98, 1998. |
23 | B. Schwartz, et al., 'Smart Packets for Active Networks'. In Proceeding of IEEE Communication Surveys, First Quarter 1999. |
24 | Chih-Lin hu, Wen-Shyen E. Chen,'A Mobile Agent-Based Active Network Architecture', Department of Electrical Engineering National Taiwan University, IEEE 0-7695-0568-6/00, 2000 |
25 | M. Wooldrige and N. Jennings. Intelligent Agents : Theory and Practice. 1995. |
26 | Dan Decasper and Bernhard Plattner. 'DAN: Distributed Code Cashing for active Networks', Proc IEEE INFOCOM 98, San Francisco CA, March/April 1998. |
27 | http://www.objectspace.com/voyager |
28 | http://www.tri.ibm.co.jp/aglets |
29 | Jonathan Dale, 'A Mobile Agent Architecture for distributed Information Management', 1997. |
30 | http://choices.cs.uiuc.edu/Security/cherubim/ |
31 | Alexander, D.8., Arbaugh, W.A.,Hicks, M.A., Kakkar P., Keromytis A., Moore J.T., Nettles S.M., andSmith J.M., "The Switch Ware Active Network Architecture", IEEE Network-Special Issue on Active and Controllable Networks, vol. 12 no. 3, 1998. |
32 | Stamatis Karnouskos, 'SecurityImplications of Implementing ActiveNetwork Infrastructures using AgentTechnology', Computer Networks 36(2001) 87-100. DOI |
33 | http://www.darpa.mil/ito/research |
34 | http://choices.cs.uiuc.edu/Security/seraphim/ |
35 | http://www.genmaigc.com/technology/odyssey.html |