{"title":"一组连接的中间件的策略实施体系结构","authors":"M. Ngo, Younghan Kim","doi":"10.1109/ICTC.2014.6983289","DOIUrl":null,"url":null,"abstract":"Nowadays, middleboxes have become a key component of enterprise networks. However, because of traffic modifying operations and complexity of architecture, middleboxes make many challenges to ensure correctness of policy enforcement. This paper proposes architecture to enable policy enforcement in a set of connected middleboxes.","PeriodicalId":299228,"journal":{"name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A policy enforcement architecture for a set of connected middleboxes\",\"authors\":\"M. Ngo, Younghan Kim\",\"doi\":\"10.1109/ICTC.2014.6983289\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, middleboxes have become a key component of enterprise networks. However, because of traffic modifying operations and complexity of architecture, middleboxes make many challenges to ensure correctness of policy enforcement. This paper proposes architecture to enable policy enforcement in a set of connected middleboxes.\",\"PeriodicalId\":299228,\"journal\":{\"name\":\"2014 International Conference on Information and Communication Technology Convergence (ICTC)\",\"volume\":\"102 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Information and Communication Technology Convergence (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTC.2014.6983289\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC.2014.6983289","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A policy enforcement architecture for a set of connected middleboxes
Nowadays, middleboxes have become a key component of enterprise networks. However, because of traffic modifying operations and complexity of architecture, middleboxes make many challenges to ensure correctness of policy enforcement. This paper proposes architecture to enable policy enforcement in a set of connected middleboxes.