The purpose of this document is to express what the engineering community as represented by the IETF expects of Internet Service Providers (ISPs) with respect to security.
RFC Downloads
Cited By
- Naylor D, Mukerjee M and Steenkiste P (2014). Balancing accountability and privacy in the network, ACM SIGCOMM Computer Communication Review, 44:4, (75-86), Online publication date: 25-Feb-2015.
- Gilad Y and Herzberg A (2014). Off-Path TCP Injection Attacks, ACM Transactions on Information and System Security (TISSEC), 16:4, (1-32), Online publication date: 1-Apr-2014.
- Xia Y and Yeo C (2014). Mobile Internet access over intermittent network connectivity, Journal of Network and Computer Applications, 40:C, (126-138), Online publication date: 1-Apr-2014.
- Naylor D, Mukerjee M and Steenkiste P Balancing accountability and privacy in the network Proceedings of the 2014 ACM conference on SIGCOMM, (75-86)
- Gilad Y and Herzberg A (2013). Fragmentation Considered Vulnerable, ACM Transactions on Information and System Security, 15:4, (1-31), Online publication date: 1-Apr-2013.
- Gilad Y and Herzberg A When tolerance causes weakness Proceedings of the 22nd international conference on World Wide Web, (435-446)
- Gilad Y and Herzberg A (2012). LOT, ACM Transactions on Information and System Security, 15:2, (1-30), Online publication date: 1-Jul-2012.
- Gilad Y and Herzberg A Spying in the dark Proceedings of the 12th international conference on Privacy Enhancing Technologies, (100-119)
- Koivunen E "Why wasn't i notified?" Proceedings of the 15th Nordic conference on Information Security Technology for Applications, (55-70)
- Ehrenkranz T and Li J (2009). On the state of IP spoofing defense, ACM Transactions on Internet Technology (TOIT), 9:2, (1-29), Online publication date: 1-May-2009.
- Xie Y, Yu F and Abadi M De-anonymizing the internet using unreliable IDs Proceedings of the ACM SIGCOMM 2009 conference on Data communication, (75-86)
- Xie Y, Yu F and Abadi M (2009). De-anonymizing the internet using unreliable IDs, ACM SIGCOMM Computer Communication Review, 39:4, (75-86), Online publication date: 16-Aug-2009.
- Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D and Shenker S (2008). Accountable internet protocol (aip), ACM SIGCOMM Computer Communication Review, 38:4, (339-350), Online publication date: 1-Oct-2008.
- Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D and Shenker S Accountable internet protocol (aip) Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (339-350)
- Marchetti M and Colajanni M Adaptive traffic filtering for efficient and secure IP-mobility Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (43-50)
- Chen R, Park J and Marchany R (2007). A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks, IEEE Transactions on Parallel and Distributed Systems, 18:5, (577-588), Online publication date: 1-May-2007.
- Bremler-Barr A and Levy H Brief announcement Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, (375-375)
Recommendations
Quality of Security Service for Web Services within SOA
SERVICES '09: Proceedings of the 2009 Congress on Services - IService-Oriented Architecture (SOA) is a paradigm for creating and encapsulating business processes in the form of loose-coupling, autonomous and abstracted services. Managing the non-functional requirements of SOA such as security, is an overarching ...
Web services from a service provider perspective: tenant management services for multitenant information systems
While web service discovery and composition are important for web service "consumers", service providers face other challenges. This paper looks on their needs in an important commercial scenario. In this scenario, bundling service providers combine ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the IoT ...