期刊文献+

主动网络技术及应用研究 被引量:4

RESEARCH ON ACTIVE NETWORK AND ITS APPLICATION
下载PDF
导出
摘要 对主动网络的体系结构及关键技术进行了的探讨 ,重点论述了主动网络应用技术和研究状况。指出了有待研究的一些问题及主动网络研究发展的前景。 This Paper investigates the architecture of the active networks and its related key technology, introduces some hot research points of active networks application and their current improvementin in detail. In the end, it points out the development perspeitive in active network research.
出处 《计算机应用》 CSCD 北大核心 2002年第7期21-24,共4页 journal of Computer Applications
关键词 主动网络 节点操作系统 主动网络应用 active network note OS active network application
  • 相关文献

参考文献7

  • 1[1]Perterson, Larry. NodeOS Interface Specification[R].DARPA Architecture Working Group draft specification, January 24, 2000.
  • 2[2]Tschudin C., Lundgren H., Gulbrandsen H. Active Routing for Ad hoc Networks [J]. IEEE Communication Magazine,2000,38(4): 122-127.
  • 3[3]D. Scott Alexander, William A. Arbaugh, Michael W. Hicks, et al. The Switch Ware Active Network Architecture[J]. IEEE Network Special Issue on Active and Controllable Networks, 1998,12(3):29 - 36.
  • 4[4]Campbell A.T., Kounavis M.E., Villela D., et al. SpawningNetworks. IEEE Network [J],1999,13(4):16-30.
  • 5[5]Campbell A.T., De Meer H.G., Kounavis M. E., et al. The Genesis Kernel: A Virtual Network Operating System for Spawning Network Architectures[A]. Proceedings of the IEEE 2nd International Conference on Open Architectures and Network Programmability (OPENARCH′99)[C], October 1998.115-127.
  • 6[6]Amir E., McCanne S., katz R. An active service framework and its application to real-time multimedia transcoding[A]. ACM SIGCOMM[C], September 1998.
  • 7[7]W. Lehman, S. Garland, D. L. Tennenhouse. Active reliablemulticast[A]. Proceedings of the Conference on Computer Communications (IEEE Infocom)[C], (San Francisco, California), March/April 1998.581.

同被引文献22

  • 1Liu Zhaoyu, Campbell R H, Mickunas M D. Securing the Node of an Active Network[ EB/OL]. http://www. cs. uiuc.edu/Dienst/UI/2.0/Describe/ncstrl. uiuc-cs,2000.
  • 2Sandhu R S, Coyne E J. Role - based access control models[J]. IEEE Computer, 1996,29(2) :38 -47.
  • 3Linn J. Ceneric Security Service Application Program Interface, Version 2. RFC 2078[S] .January 1997.
  • 4韦乐平.演进之路[J].网络世界,2003,.
  • 5R Maresca, M D Arienzo, M Esposito, S P Romanmo, G Ventre. An Active Network Approach to Virtual Private Netwaorks[C]. The 7th International symposium on Computer and Communications, 2001-3.
  • 6Raz D, Shavitt Y. Active networks for efficient distributed network management[J].IEEE Commun Mag, 2000, (3): 138-143.
  • 7Smith R, Djahandari K, Sterne D. Cooperative intrusion trace back and response architecture (CITRA)[R]. Anaheim, CA: Proceedings of the Second DARPA Information Survivability Conference and Exposition(DISCEX II), 2001.
  • 8Tipton H, Krause M. Information security management handbook[M]. 4th ed. Boca Raton:CRC Press, 2000.
  • 9Chang B, Kim D, Kwon Y. Security management by zone cooperation in active network environment [R]. Las Vegas, USA: proceedings of the 2002 International Conference on Security and Management (SAM'02), 2002.187-192.
  • 10许强,温涛,赵宏.主动网络技术──新一代网络体系结构的发展趋势[J].计算机工程,2000,26(2):1-3. 被引量:3

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部