1989
DOI: 10.17487/rfc1102
|View full text |Cite
|
Sign up to set email alerts
|

Policy routing in Internet protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

1989
1989
2019
2019

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 78 publications
(29 citation statements)
references
References 0 publications
0
28
0
1
Order By: Relevance
“…user control [34] and provider control [33]. The two proposals were shown to have rough equivalence in the set of expressible policies, yet from the tussle viewpoint they had very different consequences.…”
Section: ) Competitive Wide Area Accessmentioning
confidence: 99%
“…user control [34] and provider control [33]. The two proposals were shown to have rough equivalence in the set of expressible policies, yet from the tussle viewpoint they had very different consequences.…”
Section: ) Competitive Wide Area Accessmentioning
confidence: 99%
“…Regarding network routing, some studies [4,5] propose the use of policies in order to obtain cost savings and quality of service (QoS) in the routing task. In this work, we deal with specific characteristics and solutions of WSNs.…”
Section: Policies On Networkmentioning
confidence: 99%
“…In contrast, network capabilities are concerned with authentication and routing through intermediate ASes. In a subsequent paper [16], the authors also considered implementing preventative security measures within Clark's policy routing framework [11].…”
Section: Related Workmentioning
confidence: 99%