2002
DOI: 10.1109/mnet.2002.993217
|View full text |Cite
|
Sign up to set email alerts
|

Guest editorial - policy-based networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2003
2003
2013
2013

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Some, such as code-carrying packets, are quite different from the 4D approach, but others, such as creating a minimal kernel of functionality implemented on each router/switch to be invoked from another location [34] [38]. While very useful for specific tasks, network-management tools and PBN approaches usually assume the existing control-plane protocols, focus on a small portion of the configuration state (e.g., packet filters, but not routing), and do not consider the interactions among multiple mechanisms.…”
Section: Traditional Telecommunications Networkmentioning
confidence: 99%
“…Some, such as code-carrying packets, are quite different from the 4D approach, but others, such as creating a minimal kernel of functionality implemented on each router/switch to be invoked from another location [34] [38]. While very useful for specific tasks, network-management tools and PBN approaches usually assume the existing control-plane protocols, focus on a small portion of the configuration state (e.g., packet filters, but not routing), and do not consider the interactions among multiple mechanisms.…”
Section: Traditional Telecommunications Networkmentioning
confidence: 99%
“…Examples include epidemic algorithms [5] for distributing data, Bayesian networks for learning [4], rank aggregation to enable a web of trust [6], constraint satisfaction algorithms [21], and policy-based management techniques [23,24].…”
Section: Creating a Knowledge Plane 51 Possible Building Blocksmentioning
confidence: 99%
“…Even though, paper [16] is to compare the performance of client server architecture and fault tolerance mobile agent system, and cared about security aspects too. A mobile agent is created and dispatched to the certificate authority [7,16].…”
Section: Related Workmentioning
confidence: 99%
“…Mobile code, and in particular mobile agents, will be an essential tool for allowing such access. Mobile agents are considered as a program, though they have some special properties that differentiate them from the principal programs like mandatory and orthogonal (optional) properties [5][6][7]. Agents can work without the human interruption or others, reactive or proactive decision making.…”
Section: Introductionmentioning
confidence: 99%