語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
到查詢結果
[ subject:"Computer Science." ]
切換:
標籤
|
MARC模式
|
ISBD
Enhancing end-hosts to improve compu...
~
Blaich, Andrew C.
Enhancing end-hosts to improve computer security and wireless performance for networked environments.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
書名/作者:
Enhancing end-hosts to improve computer security and wireless performance for networked environments.
作者:
Blaich, Andrew C.
面頁冊數:
192 p.
附註:
Source: Dissertation Abstracts International, Volume: 72-03, Section: B, page: 1569.
Contained By:
Dissertation Abstracts International72-03B.
標題:
Computer Science.
ISBN:
9781124466941
摘要、提要註:
The number of network connected computing devices is continuing to increase substantially, which is made evident as the IPv4 address space continues to run out. This trend of increased devices with network connectivity demands an advancement in the complexity and scale of techniques to properly manage and secure networked devices. When networking was in its infancy, there was a lack of diversity in the types of applications used across a network. Today, however, there is a diverse ecosystem of applications that are driving up bandwidth demands and driving down the effectiveness of ubiquitous security solutions. Context, which refers to the interrelated conditions in which something exists or occurs, is needed in order to effectively manage the network and its resources. This dissertation examines the use of context in order to enhance computer security and 802.11 wireless network performance.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3441777
Enhancing end-hosts to improve computer security and wireless performance for networked environments.
Blaich, Andrew C.
Enhancing end-hosts to improve computer security and wireless performance for networked environments.
- 192 p.
Source: Dissertation Abstracts International, Volume: 72-03, Section: B, page: 1569.
Thesis (Ph.D.)--University of Notre Dame, 2011.
The number of network connected computing devices is continuing to increase substantially, which is made evident as the IPv4 address space continues to run out. This trend of increased devices with network connectivity demands an advancement in the complexity and scale of techniques to properly manage and secure networked devices. When networking was in its infancy, there was a lack of diversity in the types of applications used across a network. Today, however, there is a diverse ecosystem of applications that are driving up bandwidth demands and driving down the effectiveness of ubiquitous security solutions. Context, which refers to the interrelated conditions in which something exists or occurs, is needed in order to effectively manage the network and its resources. This dissertation examines the use of context in order to enhance computer security and 802.11 wireless network performance.
ISBN: 9781124466941Subjects--Topical Terms:
423143
Computer Science.
Enhancing end-hosts to improve computer security and wireless performance for networked environments.
LDR
:04084nam 2200301 4500
001
365269
005
20120516132859.5
008
121018s2011 ||||||||||||||||| ||eng d
020
$a
9781124466941
035
$a
(UMI)AAI3441777
035
$a
AAI3441777
040
$a
UMI
$c
UMI
100
1
$a
Blaich, Andrew C.
$3
475287
245
1 0
$a
Enhancing end-hosts to improve computer security and wireless performance for networked environments.
300
$a
192 p.
500
$a
Source: Dissertation Abstracts International, Volume: 72-03, Section: B, page: 1569.
500
$a
Adviser: Aaron Striegel.
502
$a
Thesis (Ph.D.)--University of Notre Dame, 2011.
520
$a
The number of network connected computing devices is continuing to increase substantially, which is made evident as the IPv4 address space continues to run out. This trend of increased devices with network connectivity demands an advancement in the complexity and scale of techniques to properly manage and secure networked devices. When networking was in its infancy, there was a lack of diversity in the types of applications used across a network. Today, however, there is a diverse ecosystem of applications that are driving up bandwidth demands and driving down the effectiveness of ubiquitous security solutions. Context, which refers to the interrelated conditions in which something exists or occurs, is needed in order to effectively manage the network and its resources. This dissertation examines the use of context in order to enhance computer security and 802.11 wireless network performance.
520
$a
The first portion of this work focuses on enhancing computer security with the use of context. The common techniques of securing a network device based on port number, e.g. traditional firewalls, are too coarse grained because port number is no longer a direct inference of the type of application being used. Rather, a finer grained technique is needed to provide sufficient security management for a network. The use of context from an end-host that describes the interrelated conditions of a network connection is needed for an accurate account of the activities a machine is conducting so that network policy can be adequately enforced. When a network connection is encrypted an end-host solution is capable of gathering context, whereas a centralized solution would struggle.
520
$a
The second portion of this work focuses on wireless performance and the need for context to enhance performance. When 802.11 wireless was in its infancy, there were fewer devices using the spectrum than today. This paucity of wireless devices made it acceptable for these devices to locally optimize their own performance without consideration for the performance of other devices around them. However, as the number of wireless devices increases, the decisions made by one device can have a detrimental effect on the performance of other devices. In this case, a solution is needed that takes into account the context or performance metrics of neighboring nodes in order optimize and guide the performance adaptation of a single node.
520
$a
It is the goal of this work to make computing devices aware of the events occurring within their networks via the addition of context in order to improve the security and the performance of wireless devices. In regard to security, techniques are presented that enable fine-grained end-host enforcement with the Linux Security Module framework. In terms of wireless networking, an in depth study involving real-world, laboratory, and simulation experiments about the function of 802.11 is presented, which leads to the creation of a context aware adaptation algorithm. Through these two contributions to both computer security and networking, advancements can be made in the management and performance of wireless devices.
590
$a
School code: 0165.
650
4
$a
Computer Science.
$3
423143
690
$a
0984
710
2
$a
University of Notre Dame.
$3
475288
773
0
$t
Dissertation Abstracts International
$g
72-03B.
790
1 0
$a
Striegel, Aaron,
$e
advisor
790
$a
0165
791
$a
Ph.D.
792
$a
2011
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3441777
筆 0 讀者評論
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3441777
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入