|
|
|
|
LEADER |
03684nam a22005535i 4500 |
001 |
978-3-319-67080-5 |
003 |
DE-He213 |
005 |
20171014084712.0 |
007 |
cr nn 008mamaa |
008 |
171014s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319670805
|9 978-3-319-67080-5
|
024 |
7 |
|
|a 10.1007/978-3-319-67080-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
100 |
1 |
|
|a Perrig, Adrian.
|e author.
|
245 |
1 |
0 |
|a SCION: A Secure Internet Architecture
|h [electronic resource] /
|c by Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XX, 432 p. 120 illus., 78 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Security and Cryptography,
|x 1619-7100
|
505 |
0 |
|
|a Part I: SCION Overview -- Introduction -- Isolation Domains -- Part II: SCION Details -- Network Control Plane -- Network Data Plane -- Authentication -- ISD Coordination -- Name Resolution -- Part III: Analysis and Evaluation -- Security Analysis -- Modeling Energy Consumption of a SCION-Enabled Network -- Part IV: Deployment and Operation -- Deployment -- Operation -- Part V: Low-Level Details -- Packet Formats -- Configuration File Formats -- Cryptographic Algorithms -- Border Router.
|
520 |
|
|
|a This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a System safety.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Szalachowski, Pawel.
|e author.
|
700 |
1 |
|
|a Reischuk, Raphael M.
|e author.
|
700 |
1 |
|
|a Chuat, Laurent.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319670799
|
830 |
|
0 |
|a Information Security and Cryptography,
|x 1619-7100
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-67080-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|