skip to main content
10.1145/1851182.1851240acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Free access

Fived: a service-based architecture implementation to innovate at the endpoints

Published: 30 August 2010 Publication History

Abstract

Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement these critical features. The access control that does exist on the network doesn't integrate well with user authentication systems, so access control decisions are based on the network location of a computer rather than the privilege level of its user. Just about every layer of the Internet provides optional encryption, yet most data on the Internet continues to be sent in the clear. Application developers routinely make mistakes in security critical code leading to bugs that manifest in worms, malware or provide a doorway for actively malicious attackers. We propose a unified session layer that integrates trustworthiness features into the core of the network. This would reverse the fortunes of security on the Internet and lead us toward a safer, more secure global network.

References

[1]
Hurricane Electric, "Hurricane electric ipv4 exhaustion counters." {Online}. Available: http://ipv6.he.net/statistics.
[2]
M. Lotter. (1988, November) RFC 1078. {Online}. Available: http://www.rfc-editor.org/rfc/rfc1078.tx.
[3]
J. Saltzer, D. Reed, and D. Clark, "End-to-end arguments in system design," ACM Transactions on Computer Systems (TOCS), vol. 2, no. 4, p. 288, 1984.

Index Terms

  1. Fived: a service-based architecture implementation to innovate at the endpoints

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference
      August 2010
      500 pages
      ISBN:9781450302012
      DOI:10.1145/1851182
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 40, Issue 4
        SIGCOMM '10
        October 2010
        481 pages
        ISSN:0146-4833
        DOI:10.1145/1851275
        Issue’s Table of Contents

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 August 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. fived
      2. network architecture
      3. network design
      4. session layer
      5. sessions

      Qualifiers

      • Poster

      Conference

      SIGCOMM '10
      Sponsor:
      SIGCOMM '10: ACM SIGCOMM 2010 Conference
      August 30 - September 3, 2010
      New Delhi, India

      Acceptance Rates

      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 229
        Total Downloads
      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)8
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media