Changes between Version 2 and Version 3 of Quarterly-ExptsSec-GEC16report.txt
- Timestamp:
- 04/15/13 17:20:03 (11 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Quarterly-ExptsSec-GEC16report.txt
v2 v3 17 17 18 18 === A. Activities and findings === 19 Some activities are education related and publication related . We used ProtoGENI in a graduate course of distributed systems during 2013 spring semester. And a paper describing vulnerability analysis based on ProtoGENI experiments was published in Jan 2013 by IEEE System Journal (listed in Publications). In the paper we introduced our experimental study on the vulnerability of ProtoGENI and considerations on mitigating strategies. There were research activities by Dr Hong with OpenFlow and software defined networks. Purchases were made. [[BR]]19 Some activities are education related and publication related (listed in Publications). We used ProtoGENI in a graduate course of distributed systems during 2013 spring semester. A paper describing vulnerability analysis based on ProtoGENI experiments was published in Jan 2013 by IEEE System Journal. In the paper we introduced our experimental study on the vulnerability of ProtoGENI and considerations on mitigating strategies. Another paper reviewing GENI authentication and access control was accepted by International Journal of Security and Networks. There were research activities by Dr Hong with OpenFlow and software defined networks. Purchases were made. [[BR]] 20 20 21 21 … … 30 30 Dawei Li, Xiaoyan Hong, Darwin Witt, “ProtoGENI, a Prototype GENI under Security Vulnerabilities: An Experiment-Based Security Study”, IEEE Systems Journal, special issue on Security and Privacy of Complex Systems, No. 99, Jan. 2013. [[BR]] 31 31 32 Z. Xiao, B. Fu, Y. Xiao, C. L. P. Chen, and W. Liang, "A Review of GENI Authentication and Access Control Mechanisms," International Journal of Security and Networks (IJSN), accepted. [[BR]] 32 33 33 34 === D. Outreach activities ===