{"id":"https://openalex.org/W2160694144","doi":"https://doi.org/10.1109/glocom.2010.5684006","title":"Signaling Architecture for Network Traffic Authorization","display_name":"Signaling Architecture for Network Traffic Authorization","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2160694144","doi":"https://doi.org/10.1109/glocom.2010.5684006","mag":"2160694144"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2010.5684006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2010.5684006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001013684","display_name":"Se Gi Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Se Gi Hong","raw_affiliation_strings":["Columbia University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Columbia University, New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010850094","display_name":"Henning Schulzrinne","orcid":"https://orcid.org/0000-0001-7604-1122"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Henning Schulzrinne","raw_affiliation_strings":["Columbia University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Columbia University, New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058813740","display_name":"Swen Weiland","orcid":null},"institutions":[{"id":"https://openalex.org/I74656192","display_name":"University of G\u00f6ttingen","ror":"https://ror.org/01y9bpm73","country_code":"DE","type":"education","lineage":["https://openalex.org/I74656192"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Swen Weiland","raw_affiliation_strings":["University of G\u00f6ttingen, Germany"],"affiliations":[{"raw_affiliation_string":"University of G\u00f6ttingen, Germany","institution_ids":["https://openalex.org/I74656192"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001013684"],"corresponding_institution_ids":["https://openalex.org/I78577930"],"apc_list":null,"apc_paid":null,"fwci":0.9021,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81583828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9751206040382385},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7463300228118896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6736794710159302},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6537413597106934},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6351230144500732},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6210203170776367},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.595152735710144},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3576790690422058}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9751206040382385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7463300228118896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6736794710159302},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6537413597106934},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6351230144500732},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6210203170776367},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.595152735710144},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3576790690422058},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2010.5684006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2010.5684006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W118842186","https://openalex.org/W192498908","https://openalex.org/W1580319845","https://openalex.org/W1947147078","https://openalex.org/W1967949770","https://openalex.org/W2003793121","https://openalex.org/W2030650827","https://openalex.org/W2097602077","https://openalex.org/W2098334439","https://openalex.org/W2108986426","https://openalex.org/W2118878434","https://openalex.org/W2119101903","https://openalex.org/W2130375967","https://openalex.org/W2139153904","https://openalex.org/W2141973513","https://openalex.org/W2154178154","https://openalex.org/W2156954980","https://openalex.org/W2158060559","https://openalex.org/W2563844401","https://openalex.org/W6675051522"],"related_works":["https://openalex.org/W2074755311","https://openalex.org/W2379813727","https://openalex.org/W2151660018","https://openalex.org/W1982914007","https://openalex.org/W2159583675","https://openalex.org/W1852113167","https://openalex.org/W1493858311","https://openalex.org/W1824242903","https://openalex.org/W2155470929","https://openalex.org/W2394465510"],"abstract_inverted_index":{"Capability-based":[0],"systems":[1,26,81],"that":[2,28,51,85,157],"use":[3],"explicit":[4],"authorization":[5,90],"(permission)":[6,91],"for":[7,61,95],"flows":[8],"have":[9],"been":[10],"proposed":[11],"in":[12,32,82,135],"order":[13],"to":[14,69,78,104,132,165],"prevent":[15,70,166],"Denial-of-Service":[16],"(DoS)":[17],"attacks.":[18,72,150],"Even":[19],"though":[20],"the":[21,34,39,53,75,83,86,106,119,173,176],"performance":[22,154],"analyses":[23],"of":[24,41,108,118,147,169,175],"these":[25],"show":[27,156],"they":[29,36],"are":[30],"efficient":[31],"preventing":[33],"attacks,":[35,170],"suffer":[37],"from":[38,92],"difficulty":[40],"obtaining":[42],"permission,":[43],"incompatibility":[44],"with":[45],"current":[46,124],"network":[47,62,125,179],"architecture,":[48],"and":[49,101,116,129,153,162,171],"attacks":[50],"circumvent":[52],"permission":[54,120],"rules.":[55],"We":[56],"propose":[57],"a":[58,93,140,144],"signaling":[59,112],"architecture":[60],"traffic":[63],"authorization,":[64],"called":[65],"Permission-Based-Sending":[66],"(PBS),":[67],"aiming":[68],"DoS":[71],"PBS":[73,98,131,158],"uses":[74],"concept":[76],"similar":[77],"existing":[79,136],"capability-based":[80],"manner":[84],"sender":[87],"should":[88],"get":[89],"receiver":[94],"flows.":[96],"However,":[97],"introduces":[99],"new":[100],"practical":[102],"approaches":[103],"overcome":[105],"deficiencies":[107],"those":[109],"systems.":[110],"On-path":[111],"enables":[113],"easy":[114],"installation":[115],"management":[117],"state.":[121],"Working":[122],"on":[123],"protocols":[126],"supports":[127],"compatibility":[128],"allows":[130],"be":[133],"deployed":[134],"networks.":[137],"In":[138],"addition,":[139],"monitoring":[141],"mechanism":[142],"provides":[143],"second":[145],"line":[146],"defense":[148],"against":[149,178],"Our":[151],"analysis":[152],"evaluation":[155],"is":[159],"an":[160],"effective":[161],"scalable":[163],"solution":[164],"several":[167],"kinds":[168],"improves":[172],"resilience":[174],"system":[177],"failure":[180],"by":[181],"using":[182],"soft-state":[183],"mechanisms.":[184]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
