Developement Strategy for the National Research Network and Next Generation Network Security |
Lee, Myoungsun
(한국과학기술정보연구원/첨단연구망서비스실)
Cho, Buseung (한국과학기술정보연구원/첨단연구망서비스실) Park, Hyoungwoo (한국과학기술정보연구원/첨단연구망서비스실) Kim, Hyuncheol (남서울대학교/컴퓨터학과) |
1 | McKeown, Nick, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Sc ott Shenker, and Jonathan Turner. "OpenFlow: enab ling innovation in campus networks." ACM SIGCO MM Computer Communication Review 38, no. 2, 2008 |
2 | Tony Hey, Stewart Tansley, Kristin Tolle, The Fourth Paradigm: Data-Intensive Scientific Discovery", Microsoft Research, 2009.10.16 |
3 | Internet2, http://www.internet2.edu/ |
4 | ESnet, http://es.net/ |
5 | CANARIE, https://www.canarie.ca/ |
6 | SURFnet, https://www.surf.nl/ |
7 | GEANT, http://www.geant.org/ |
8 | SINET, https://www.sinet.ad.jp/ |
9 | JGN-X, http://www.jgn.nict.go.jp/ |
10 | AARNET, https://www.aarnet.edu.au/ |
11 | KREONET, http://www.kreonet.net/ |
12 | GLIF, http://glif.is/ |
13 | GEANT Expert Group, "Knowledge without Borders-GEANT2020 as the European Communications Commons", European Commission, 2011.10 |
14 | NORDUnet, "The Role of NREN's in 2020", 2011 |
15 | Inder Monga, Eric Pouyoul, Chin Guok, "Software-Defined Networking for Big-Data Science - Architectural Models from Campus to the WAN", 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC), 2012 |
16 | Kwangjong Cho, SeongHae Kim, HyeakRo Lee, "GLORIAD-KR and Its Advanced Applications", 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), 2010 |
17 | Dart, Eli, Lauren Rotman, Brian Tierney, Mary Hester, and Jason Zurawski. "The science dmz: A network design pattern for data-intensive science." Scientific Programming 22, no. 2, 2014 |
18 | Edward Balas, AJ Ragusa, "SciPass: a 100Gbps capable secure Science DMZ using OpenFlow and Bro", Supercomputing 2014 conference (SC14), 2014 |
19 | SciPass https://github.com/GlobalNOC/SciPass |
20 | Vern Paxson "Bro: A System for Detecting Network Intruders in Real-Time" Computer Networks, 31(23-24), pp. 2435-2463, 1999 DOI |