{"id":"https://openalex.org/W2035077977","doi":"https://doi.org/10.1109/infcom.2010.5462200","title":"Safeguarding Data Delivery by Decoupling Path Propagation and Adoption","display_name":"Safeguarding Data Delivery by Decoupling Path Propagation and Adoption","publication_year":2010,"publication_date":"2010-03-01","ids":{"openalex":"https://openalex.org/W2035077977","doi":"https://doi.org/10.1109/infcom.2010.5462200","mag":"2035077977"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2010.5462200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2010.5462200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040206970","display_name":"Mingui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingui Zhang","raw_affiliation_strings":["Tsinghua National Laboratory of Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China","Tsinghua National Laboratory for Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China.#TAB#"],"affiliations":[{"raw_affiliation_string":"Tsinghua National Laboratory of Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua National Laboratory for Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China.#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395586","display_name":"Bin Liu","orcid":"https://orcid.org/0000-0003-3031-9592"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liu","raw_affiliation_strings":["Tsinghua National Laboratory of Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China","Tsinghua National Laboratory for Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China.#TAB#"],"affiliations":[{"raw_affiliation_string":"Tsinghua National Laboratory of Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua National Laboratory for Information Science and Technology, Computer Science and Technology Department, Tsinghua University, Beijing, China.#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050010654","display_name":"Beichuan Zhang","orcid":"https://orcid.org/0009-0001-5333-8465"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Beichuan Zhang","raw_affiliation_strings":["Computer Science Department, University of Arizona Tucson, Tucson, AZ, USA","Computer Science Department, The University of Arizona, Tucson, AZ#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Arizona Tucson, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Computer Science Department, The University of Arizona, Tucson, AZ#TAB#","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040206970"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.3965,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.84674665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7829205989837646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6515209674835205},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5896108746528625},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5378066897392273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5240443348884583},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.507956326007843},{"id":"https://openalex.org/keywords/decoupling","display_name":"Decoupling (probability)","score":0.4777095317840576},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.4579412639141083},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44866758584976196},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44011014699935913},{"id":"https://openalex.org/keywords/data-loss","display_name":"Data loss","score":0.4289107024669647},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35635435581207275},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10515305399894714}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7829205989837646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6515209674835205},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5896108746528625},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5378066897392273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5240443348884583},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.507956326007843},{"id":"https://openalex.org/C205606062","wikidata":"https://www.wikidata.org/wiki/Q5249645","display_name":"Decoupling (probability)","level":2,"score":0.4777095317840576},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.4579412639141083},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44866758584976196},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44011014699935913},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.4289107024669647},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35635435581207275},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10515305399894714},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/infcom.2010.5462200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2010.5462200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.157.1296","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.1296","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.arizona.edu/~bzhang/paper/10-infocom-qbgp.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1562530803","https://openalex.org/W1811828243","https://openalex.org/W2003590000","https://openalex.org/W2083793737","https://openalex.org/W2095349709","https://openalex.org/W2108465375","https://openalex.org/W2109008366","https://openalex.org/W2115974339","https://openalex.org/W2122696741","https://openalex.org/W2127904496","https://openalex.org/W2133396782","https://openalex.org/W2135434540","https://openalex.org/W2136680211","https://openalex.org/W2138370688","https://openalex.org/W2153987726","https://openalex.org/W2156262578","https://openalex.org/W2162695692","https://openalex.org/W2169591605","https://openalex.org/W2587378605","https://openalex.org/W4255131925","https://openalex.org/W6633638285","https://openalex.org/W6638037704"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2374550342"],"abstract_inverted_index":{"False":[0],"routing":[1,101,113],"announcements":[2,114],"are":[3,131],"a":[4,49,65,74,80],"serious":[5],"security":[6],"problem,":[7],"which":[8,69,134],"can":[9,53,108],"lead":[10],"to":[11,33,91,103],"widespread":[12],"service":[13],"disruptions":[14],"in":[15,99,137],"the":[16,58,71,77,100],"Internet.":[17],"A":[18],"number":[19],"of":[20,73,79,115],"detection":[21,43],"systems":[22,44],"have":[23],"been":[24],"proposed":[25],"and":[26,38,76,122,146,157,161],"implemented":[27],"recently,":[28],"however,":[29],"it":[30,158],"takes":[31],"time":[32],"detect":[34],"attacks,":[35],"notify":[36],"operators,":[37],"stop":[39],"false":[40,116,118,120,123],"announcements.":[41],"Thus":[42],"should":[45],"be":[46],"complemented":[47],"by":[48],"mitigation":[50,66],"scheme":[51],"that":[52,151],"protect":[54,109],"data":[55,83,93,110],"delivery":[56,111],"before":[57],"attack":[59,105],"is":[60,153],"resolved.":[61],"We":[62],"propose":[63],"such":[64],"scheme,":[67],"QBGP,":[68],"decouples":[70],"propagation":[72],"path":[75,81],"adoption":[78],"for":[82],"forwarding.":[84],"QBGP":[85,125,152],"does":[86],"not":[87],"use":[88],"suspicious":[89,132],"paths":[90],"forward":[92],"traffic,":[94],"but":[95],"still":[96],"propagates":[97],"them":[98],"system":[102],"facilitate":[104],"detection.":[106],"It":[107],"from":[112,142],"sub-prefixes,":[117],"origins,":[119],"nodes":[121],"links.":[124],"incurs":[126,162],"overhead":[127,164],"only":[128],"when":[129],"there":[130],"paths,":[133],"happen":[135],"infrequently":[136],"real":[138],"BGP":[139,147],"traces.":[140],"Results":[141],"large":[143],"scale":[144],"simulations":[145],"trace":[148],"analysis":[149],"show":[150],"light-weight":[154],"yet":[155],"effective,":[156],"converges":[159],"faster":[160],"less":[163],"than":[165],"Pretty":[166],"Good":[167],"BGP.":[168]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
