437 research outputs found

    MUSeS: Mobile User Secured Session

    Get PDF
    International audienceMobility and security are very important services for both current and future network infrastructures. However, the integration of mobility in traditional virtual private networks is difficult due to the costs of re-establishing broken secure tunnels and restarting broken application connections. In order to address this issue, we propose a new communication system called Mobile User Secured Session. Based upon a peer-to-peer overlay network, it provides security services to the application layer connections of mobile users. The secure and resilient sessions allow user connections to survive network failures as opposed to regular transport layer secured connections. We have implemented a prototype and have assessed its proper functioning by running experimentations upon a simple virtual dynamic network

    Formal analysis techniques for gossiping protocols

    Get PDF
    We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner. We present properties of interest for gossiping protocols and discuss how various formal evaluation techniques can be employed to predict them

    Dynamic service composition for telecommunication services and its challenges

    Get PDF
    As communication networks have evolved towards IP (Internet Protocol) networks, telecommunication operators has expanded its reach to internet multimedia web content services while operating circuit-switch networks in parallel. With the adoption of SOA (Service Oriented Architecture) that enables service capability interfaces to be published and integrated with other service capabilities into new composite service, service composition allows telecommunication providers to accelerate more new services provisioning. From the perspective of telecommunication providers to deliver integrated composite service from different providers and different network protocols, this paper is aimed to present the current service composition based on middleware approaches; discuss the requirements of meeting the challenges; and compare the approaches
    • ā€¦
    corecore