DocumentCode :
3044624
Title :
Securing distributed adaptation
Author :
Li, Jun ; Yarvis, Mark ; Reiher, Peter
Author_Institution :
California Univ., Los Angeles, CA, USA
fYear :
2001
fDate :
2001
Firstpage :
71
Lastpage :
82
Abstract :
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond those present in conventional networks. One particular security requirement is the ability of applications to protect the secrecy and integrity of transmitted data while still allowing trusted active elements within the network to operate on that data. This paper describes mechanisms for identifying trusted nodes within a network and securely deploying adaptation instructions to those nodes while protecting application data from unauthorized access and modification. Promising experimental results of our implementation within the conductor adaptation framework are also presented, suggesting that such features can be incorporated into real networks
Keywords :
computer networks; open systems; security of data; telecommunication security; computer networks; distributed adaptation; fine-grained control; integrity; network elements; open architecture networks; secrecy; security; suboptimal network conditions; transmitted data; trusted active elements; Application software; Computer architecture; Cryptography; Data security; Internet; Local area networks; Protection; Protocols; Streaming media; Wireless LAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Open Architectures and Network Programming Proceedings, 2001 IEEE
Conference_Location :
Anchorage, AK
Print_ISBN :
0-7803-7064-3
Type :
conf
DOI :
10.1109/OPNARC.2001.916840
Filename :
916840
Link To Document :
بازگشت