An expectation-based approach to policy-based security of the Border Gateway Protocol.
Jun LiJoshua SteinMingwei ZhangOlaf MaennelPublished in: INFOCOM Workshops (2016)
Keyphrases
- information security
- access control
- trust negotiation
- intrusion detection
- policy enforcement
- network security
- security policies
- security requirements
- statistical databases
- security management
- security issues
- border gateway protocol
- real time
- network management
- routing protocol
- data management
- management system
- multimedia
- data mining