Verifying and Enforcing Network Paths With ICING

The authors describe a new networking primitive, called a Path Verification Mechanism (PVM). There has been much recent work about how senders and receivers express policies about the paths that their packets take. For instance, a company might want fine-grained control over which providers carry which traffic between its branch offices, or a receiver may want traffic sent to it to travel through an intrusion detection service. While the ability to express policies has been well-studied, the ability to enforce policies has not.

Provided by: Association for Computing Machinery Topic: Security Date Added: Dec 2011 Format: PDF

Find By Topic