2 Search Results for "Aziz, Benjamin"


Document
THRIFTY: Towards High Reduction In Flow Table memorY

Authors: Ali Malik, Benjamin Aziz, and Chih-Heng Ke

Published in: OASIcs, Volume 66, 2018 Imperial College Computing Student Workshop (ICCSW 2018)


Abstract
The rapid evolution of information technology has compelled the ubiquitous systems and computing to adapt with this expeditious development. Because of its rigidity, computer networks failed to meet that evolvement for decades, however, the recently emerged paradigm of software-defined networks gives a glimpse of hope for a new networking architecture that provides more flexibility and adaptability. Fault tolerance is considered one of the key concerns with respect to the software-defined networks dependability. In this paper, we propose a new architecture, named THRIFTY, to ease the recovery process when failure occurs and save the storage space of forwarding elements, which is therefore aims to enhance the fault tolerance of software-defined networks. Unlike the prevailing concept of fault management, THRIFTY uses the Edge-Core technique to forward the incoming packets. THRIFTY is tailored to fit the only centrally controlled systems such as the new architecture of software-defined networks that interestingly maintain a global view of the entire network. The architecture of THRIFTY is illustrated and experimental study is reported showing the performance of the proposed method. Further directions are suggested in the context of scalability towards achieving further advances in this research area.

Cite as

Ali Malik, Benjamin Aziz, and Chih-Heng Ke. THRIFTY: Towards High Reduction In Flow Table memorY. In 2018 Imperial College Computing Student Workshop (ICCSW 2018). Open Access Series in Informatics (OASIcs), Volume 66, pp. 2:1-2:9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)


Copy BibTex To Clipboard

@InProceedings{malik_et_al:OASIcs.ICCSW.2018.2,
  author =	{Malik, Ali and Aziz, Benjamin and Ke, Chih-Heng},
  title =	{{THRIFTY: Towards High Reduction In Flow Table memorY}},
  booktitle =	{2018 Imperial College Computing Student Workshop (ICCSW 2018)},
  pages =	{2:1--2:9},
  series =	{Open Access Series in Informatics (OASIcs)},
  ISBN =	{978-3-95977-097-2},
  ISSN =	{2190-6807},
  year =	{2019},
  volume =	{66},
  editor =	{Pirovano, Edoardo and Graversen, Eva},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.ICCSW.2018.2},
  URN =		{urn:nbn:de:0030-drops-101830},
  doi =		{10.4230/OASIcs.ICCSW.2018.2},
  annote =	{Keywords: Source Routing, Resiliency, Fault Tolerance, SDN, TCAM}
}
Document
Data-Driven Chinese Walls

Authors: Gulsum Akkuzu and Benjamin Aziz

Published in: OASIcs, Volume 66, 2018 Imperial College Computing Student Workshop (ICCSW 2018)


Abstract
Security policy and access control models are often based on qualitative attributes, e.g. security labels, cryptographic credentials. In this paper, we enrich one such model, namely the Chinese Walls model, with quantitative attributes derived from data. Therefore, we advocate a data-driven approach that considers a quantitative definition of access we term, working relations.

Cite as

Gulsum Akkuzu and Benjamin Aziz. Data-Driven Chinese Walls. In 2018 Imperial College Computing Student Workshop (ICCSW 2018). Open Access Series in Informatics (OASIcs), Volume 66, pp. 3:1-3:8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)


Copy BibTex To Clipboard

@InProceedings{akkuzu_et_al:OASIcs.ICCSW.2018.3,
  author =	{Akkuzu, Gulsum and Aziz, Benjamin},
  title =	{{Data-Driven Chinese Walls}},
  booktitle =	{2018 Imperial College Computing Student Workshop (ICCSW 2018)},
  pages =	{3:1--3:8},
  series =	{Open Access Series in Informatics (OASIcs)},
  ISBN =	{978-3-95977-097-2},
  ISSN =	{2190-6807},
  year =	{2019},
  volume =	{66},
  editor =	{Pirovano, Edoardo and Graversen, Eva},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.ICCSW.2018.3},
  URN =		{urn:nbn:de:0030-drops-101841},
  doi =		{10.4230/OASIcs.ICCSW.2018.3},
  annote =	{Keywords: Access Control, Big Data, Security Policies, Chinese Walls Model}
}
  • Refine by Author
  • 2 Aziz, Benjamin
  • 1 Akkuzu, Gulsum
  • 1 Ke, Chih-Heng
  • 1 Malik, Ali

  • Refine by Classification
  • 1 Networks → Network protocols
  • 1 Security and privacy → Access control

  • Refine by Keyword
  • 1 Access Control
  • 1 Big Data
  • 1 Chinese Walls Model
  • 1 Fault Tolerance
  • 1 Resiliency
  • Show More...

  • Refine by Type
  • 2 document

  • Refine by Publication Year
  • 2 2019

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail