{"id":"https://openalex.org/W2139789847","doi":"https://doi.org/10.1145/1851182.1851195","title":"How secure are secure interdomain routing protocols","display_name":"How secure are secure interdomain routing protocols","publication_year":2010,"publication_date":"2010-08-30","ids":{"openalex":"https://openalex.org/W2139789847","doi":"https://doi.org/10.1145/1851182.1851195","mag":"2139789847"},"language":"en","primary_location":{"id":"doi:10.1145/1851182.1851195","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1851182.1851195","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1851182.1851195","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGCOMM 2010 conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/1851182.1851195","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053290722","display_name":"Sharon Goldberg","orcid":"https://orcid.org/0000-0002-1002-3332"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sharon Goldberg","raw_affiliation_strings":["Microsoft Research, Boston, MA, USA","Microsoft Research, Boston, MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Boston, MA, USA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research, Boston, MA, USA#TAB#","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027593733","display_name":"Michael Schapira","orcid":"https://orcid.org/0000-0002-9336-8351"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael Schapira","raw_affiliation_strings":["Yale &amp; Berkeley, New Haven, CT, USA"],"affiliations":[{"raw_affiliation_string":"Yale &amp; Berkeley, New Haven, CT, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053865108","display_name":"Peter Hummon","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Hummon","raw_affiliation_strings":["AT&amp;T Research, Florham Park, NJ, USA","AT&T Research, Florham Park, NJ, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"AT&amp;T Research, Florham Park, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Research, Florham Park, NJ, USA#TAB#","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003914268","display_name":"Jennifer Rexford","orcid":"https://orcid.org/0000-0002-0231-8165"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jennifer Rexford","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA","Princeton University , Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University , Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053290722"],"corresponding_institution_ids":["https://openalex.org/I1290206253"],"apc_list":null,"apc_paid":null,"fwci":23.9299,"has_fulltext":true,"cited_by_count":118,"citation_normalized_percentile":{"value":0.99572729,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7149177193641663},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6972689628601074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6223118305206299},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6104303002357483},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6010541915893555},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5601396560668945},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5391448140144348},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.49359142780303955},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4219951331615448},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.21803131699562073},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10120370984077454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7149177193641663},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6972689628601074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6223118305206299},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6104303002357483},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6010541915893555},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5601396560668945},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5391448140144348},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.49359142780303955},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4219951331615448},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.21803131699562073},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10120370984077454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1851182.1851195","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1851182.1851195","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1851182.1851195","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGCOMM 2010 conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/1851182.1851195","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1851182.1851195","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1851182.1851195","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGCOMM 2010 conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2139789847.pdf","grobid_xml":"https://content.openalex.org/works/W2139789847.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W4085598","https://openalex.org/W65584354","https://openalex.org/W187925940","https://openalex.org/W1483178615","https://openalex.org/W1811828243","https://openalex.org/W2003590000","https://openalex.org/W2006435204","https://openalex.org/W2048384452","https://openalex.org/W2060861812","https://openalex.org/W2065283652","https://openalex.org/W2080219160","https://openalex.org/W2081254453","https://openalex.org/W2087039608","https://openalex.org/W2095349709","https://openalex.org/W2100415265","https://openalex.org/W2114071635","https://openalex.org/W2115437593","https://openalex.org/W2115974339","https://openalex.org/W2117184348","https://openalex.org/W2120514843","https://openalex.org/W2133396782","https://openalex.org/W2140339261","https://openalex.org/W2140435265","https://openalex.org/W2142065670","https://openalex.org/W2151972741","https://openalex.org/W2164983661","https://openalex.org/W2168618039","https://openalex.org/W2172027278","https://openalex.org/W2249125820","https://openalex.org/W2295430786","https://openalex.org/W2304754665","https://openalex.org/W3004192016","https://openalex.org/W4205789256","https://openalex.org/W4235631629","https://openalex.org/W4292414168","https://openalex.org/W4299301436","https://openalex.org/W6602672001","https://openalex.org/W6638037704","https://openalex.org/W6666465428"],"related_works":["https://openalex.org/W2099645399","https://openalex.org/W4313562891","https://openalex.org/W2562018880","https://openalex.org/W2002240174","https://openalex.org/W1580694830","https://openalex.org/W2051324641","https://openalex.org/W2560786373","https://openalex.org/W2232133971","https://openalex.org/W1598065085","https://openalex.org/W2518441024"],"abstract_inverted_index":{"In":[0],"response":[1],"to":[2,12,47,58],"high-profile":[3],"Internet":[4],"outages,":[5],"BGP":[6],"security":[7],"variants":[8],"have":[9],"been":[10],"proposed":[11],"prevent":[13],"the":[14,30,34,37],"propagation":[15],"of":[16,23,36],"bogus":[17],"routing":[18],"information.":[19],"To":[20],"inform":[21],"discussions":[22],"which":[24],"variant":[25],"should":[26],"be":[27],"deployed":[28],"in":[29],"Internet,":[31],"we":[32],"quantify":[33],"ability":[35],"main":[38],"protocols":[39],"(origin":[40],"authentication,":[41],"soBGP,":[42],"S-BGP,":[43],"and":[44],"data-plane":[45],"verification)":[46],"blunt":[48],"traffic-attraction":[49],"attacks;":[50],"i.e.,":[51],"an":[52],"attacker":[53],"that":[54],"deliberately":[55],"attracts":[56],"traffic":[57],"drop,":[59],"tamper,":[60],"or":[61],"eavesdrop":[62],"on":[63],"packets.":[64]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":18},{"year":2013,"cited_by_count":19},{"year":2012,"cited_by_count":16}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
