Secure Networks
The session layer has been neglected for too long. This neglect has led to applications implementing pieces of the session layer themselves. Errors in authentication and encryption code continue to cause security issues is networked applications. VPNs, firewalls, IPSec, virtual hosting, port knocking and even port numbers are all examples of technology where a well-implemented session layer could potentially provide forward progress against the status quo. In addition, a session layer can also provide improvements the modern Internet lacks, such as better support for mobility, connection bonding and other various features.
Status
Image 1: Fived in action
Fived is a daemon and client which expose a service-oriented networking system. This experimental daemon is currently our framework for experimenting with the viability, design ramifications and potential uses of a session layer on the modern Internet. While the daemon grew out of a 20 year RFC specifying the tcpmux protocol, it's moved forward by leaps and bounds to expose all kinds of interesting opportunities. We think this work has potential to create overlays that will solve a wide range of problems coming to a head on the Internet and the time seems right for change.
Publications
Date | Publication | |
---|---|---|
Nov 18, 2015 |
D J Capelis,
fived: A Session Layer Design to Secure the Internet,Technical Report UCSC-WASP-15-01, November 2015. [Secure Networks] |
|
Jun 25, 2014 |
Soror Sahri,
Rim Moussa,
Salima Benbemou,
Darrell D. E. Long,
DBaaS-Expert: A Recommender for the Selection of the Right Cloud Database,Proceedings of the Twenty-first International Symposium on Methodologies for Intelligent Systems, June 2014. [Secure File and Storage Systems] [Secure Networks] [Effective Mobility] |
|
Dec 2, 2013 |
Jehan-François Pâris,
Darrell D. E. Long,
Thomas Schwarz,
Zero-Maintenance Disk Arrays,Proceedings of the IEEE Nineteenth Pacific Rim International Symposium on Dependable Computing (PRDC), December 2013. [Secure Networks] |
|
Jan 28, 2013 |
Thomas Schwarz,
Ignacio Corderi,
Darrell D. E. Long,
Jehan-François Pâris,
Simple, Exact Placement of Data in Containers,Proceedings of International Conference on Computing, Networking and Communications (ICNC), January 2013. [Secure Networks] |
|
Oct 29, 2012 |
Yulai Xie,
Kiran-Kumar Muniswamy-Reddy,
Dan Feng,
Yan Li,
Darrell D. E. Long,
Zhipeng Tan,
Lei Chen,
A Hybrid Approach for Efficient Provenance Storage,Proceedings of International Conference on Information and Knowledge Management (CIKM), October 2012. [Secure Networks] |
|
Aug 1, 2010 |
D J Capelis,
Darrell D. E. Long,
Fived: A Service-Based Architecture Implementation to Innovate at the Endpoints,ACM SIGCOMM 2010 Conference, August 2010. [Secure Networks] |
|
Jan 1, 2010 |
Stephen Dabideen,
Brad Smith,
J.J. Garcia-Luna-Aceves,
An End-to-End Approach to Secure Routing in MANETs,Security and Communication Networks , January 2010. [Secure Networks] |
|
Oct 1, 2009 |
Stephen Dabideen,
Brad Smith,
J.J. Garcia-Luna-Aceves,
An End-to-End Solution for Secure and Survivable Routing in MANET(s),7th International Workshop on the Design of Reliable Commuication Networks (DRCN 2009), Washington D.C., October 2009. [Secure Networks] |
|
Aug 1, 2009 |
Stephen Dabideen,
Brad Smith,
J.J. Garcia-Luna-Aceves,
The Case for End-to-End Solutions to Secure Routing in MANETs,International Workshop on Security, Privacy and Trust of Computer and Cyber-Physical Networks (SecureCPN); 18th International Conference on Computer Communication and Networks (ICCCN '09), August 2009. [Secure Networks] |
|
Jul 1, 2006 |
Jehan-François Pâris,
Darrell D. E. Long,
An Analytic Study of Stream Tapping Protocols,Proceedings of the 2006 IEEE International Conference on Multimedia, July 2006. [Secure Networks] |
|
Aug 1, 2000 |
Steven W. Carter,
Darrell D. E. Long,
Jehan-François Pâris,
Efficient Implementation of Interactive Video-on-Demand,Proceedings of the Eighth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), August 2000. [Secure Networks] |
|
Jun 1, 2000 |
Benjamin C. Reed,
Using Network Attached Storage in a Secured Distributed File System,Technical Report UCSC-SSRC-2000-06, June 2000. [Secure File and Storage Systems] [Secure Networks] |
|
Jun 1, 2000 |
Benjamin C. Reed,
Network Attached Storage in a Secured Distributed File System,Technical Report UCSC-SSRC-, June 2000. [Secure Networks] |
|
Jan 1, 1999 |
Steven W. Carter,
Darrell D. E. Long,
Improving Bandwidth Efficiency of Video-on-Demand Servers,Computer Networks , January 1999. [Secure Networks] |
|
Sep 1, 1995 |
Darrell D. E. Long,
Andrew Muir,
Richard Golding,
A Longitudinal Study of Internet Host Reliability,Proceedings of the Fourteenth Symposium on Reliable Distributed Systems, September 1995. [Secure Networks] |
|
Apr 1, 1994 |
Cheng Tang,
Shree Murthy,
Darrell D. E. Long,
Performance Guarantees on ATM Networks,Proceedings of the International Performance Conference on Computers and Communication, April 1994. [Secure Networks] |
|
Jan 17, 1994 |
Richard Golding,
Darrell D. E. Long,
John Wilkes,
The refdbms Distributed Bibliographic Database System,Proceedings of the 1994 Usenix Winter Technical Conference, San Francisco: Usenix Association, January 1994. [Secure Networks] |
|
May 1, 1993 |
Darrell D. E. Long,
Carol Osterbrock,
Luis-Felipe Cabrera,
Providing Performance Guarantees in an FDDI Network,Proceedings of the Thirteenth International Conference on Distributed Computing Systems, May 1993. [Secure Networks] |
|
Jan 17, 1993 |
Richard Golding,
Darrell D. E. Long,
Simulation Modeling of Weak-Consistency Protocols,Proceedings of the First International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), San Diego: Society for Computer Simulation, January 1993. [Secure Networks] |
|
Sep 1, 1991 |
Darrell D. E. Long,
John L. Carroll,
Chanik Park,
A Study of the Reliability of Internet Sites,Proceedings of the Tenth Symposium on Reliable Distributed Systems, September 1991. [Secure Networks] |
|
Jun 5, 1989 |
Darrell D. E. Long,
John L. Carroll,
Kris Stewart,
The Reliability of Regeneration-Based Replica Control Protocols,Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Newport Beach: IEEE, June 1989. [Secure Networks] |