Analysis of Cisco Open Network Environment (ONE) OpenFlow Controller Implementation

2014 ◽  
Author(s):  
Curtis Tade ◽  
Venkat Dasari ◽  
Vinod K. Mishra
Author(s):  
Bin Hu ◽  
Yuemin Wu ◽  
Min Sun ◽  
Zheng Bang Liu ◽  
Lin Zhang ◽  
...  

Backgrounds: In order to guarantee safe and efficient operation interaction in open network environment, a new dynamic trust monitoring and updating model based on behavior context is proposed in this paper. Methods: Setting four behavior attributes such as security, availability, reliability and performance. Then utilizing the fuzzy clustering and information entropy mathematical methods to carry out the effective synthesis on such attributes. Conclusion: The effectiveness and efficiency of the schema are verified by simulation.


2015 ◽  
Vol 59 (3) ◽  
pp. 403-422 ◽  
Author(s):  
Yan Kong ◽  
Minjie Zhang ◽  
Dayong Ye

PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0258464
Author(s):  
Lei Liu ◽  
Mingwei Cao ◽  
Yeguo Sun

E-documents are carriers of sensitive data, and their security in the open network environment has always been a common problem with the field of data security. Based on the use of encryption schemes to construct secure access control, this paper proposes a fusion data security protection scheme. This scheme realizes the safe storage of data and keys by designing a hybrid symmetric encryption algorithm, a data security deletion algorithm, and a key separation storage method. The scheme also uses file filter driver technology to design a user operation state monitoring method to realize real-time monitoring of user access behavior. In addition, this paper designs and implements a prototype system. Through the verification and analysis of its usability and security, it is proved that the solution can meet the data security protection requirements of sensitive E-documents in the open network environment.


2020 ◽  
Vol 245 ◽  
pp. 07018
Author(s):  
Bruno Hoeft ◽  
Samuel Ambroj Pérez ◽  
Magnus Bergroth ◽  
Michael O’Connor ◽  
Richard Cziva

This paper explores the methods and results confirming the baseline assumption that LHCONE[1] (Large Hadron Collider Open Network Environment) traffic is science traffic. The LHCONE is a network conceived to support globally distributed collaborative science. LHCONE connects thousands of researchers to Large Hadron Collider (LHC) datasets at hundreds of universities and labs performing analysis within the global collaboration on high-energy physics. It is “Open” to all levels of the LHC as well as a short list of approved non-LHC science collaborations. LHCONE satisfies the need for a high performance global data transfer network of supporting scientific analysis. Even though LHCONE is a closed virtual private network, packets from non-LHCONE sites were found within the network on multiple occasions. This paper describes the findings, discusses the reasons and proposes some ideas on how to prevent “unroutable LHCONE packets” in order to maintain trust and integrity within the network.


Sign in / Sign up

Export Citation Format

Share Document