{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:01:29Z","timestamp":1725516089544},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692942"},{"type":"electronic","value":"9783540692959"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69295-9_45","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T02:38:25Z","timestamp":1217471905000},"page":"567-576","source":"Crossref","is-referenced-by-count":2,"title":["Cooperative Management Framework for Inter-domain Routing System"],"prefix":"10.1007","author":[{"given":"Ning","family":"Hu","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zou","sequence":"additional","affiliation":[]},{"given":"PeiDong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","unstructured":"Clark, D.D., Wroclawski, J., Sollins, K.R., Braden, R.: Tussle in Cyberspace: Defining Tomorrow\u2019s Internet. In: SIGCOMM 2002, August 19-23, 2002 (2002)"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Griffin, T.G., Wilfong, G.: An Analysis of BGP Convergence Properties. In: Proc. ACM SIGCOMM (1999)","DOI":"10.1145\/316188.316231"},{"issue":"1","key":"45_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1389-1286(99)00108-5","volume":"32","author":"K. Varadhan","year":"2000","unstructured":"Varadhan, K., Govindan, R., Estrin, D.: Persistent Route Oscillations in Inter-domain Routing. Computer Networks\u00a032(1), 1\u201316 (2000)","journal-title":"Computer Networks"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4), RFC1771 (1995)","DOI":"10.17487\/rfc1771"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfigurations. In: Proc. of ACM. SIGCOMM (August 2002)","DOI":"10.1145\/633025.633027"},{"key":"45_CR6","unstructured":"Chi-ken, C.: Policy-based Routing with Non-strict Preferences. In: ACM SIGCOMM 2006, September 11-15, 2006 (2006)"},{"key":"45_CR7","unstructured":"Haowen, C., Dash, D., Perrig, A., Zhang, H.: Modeling Adoptability of Secure BGP Protocols. In: SIGCOMM 2006, September 11-15, 2006 (2006)"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P., Xinyang, Z.: A Study of Prefix Hijacking and Interception in the Internet. In: ACM SIGCOMM, August 27-31, 2007 (2007)","DOI":"10.1145\/1282380.1282411"},{"key":"45_CR9","unstructured":"Claffy, K.: Top problems of the Internet and how to help solve them (2003), http:\/\/www.caida.org\/outreach\/presentations\/\/netproblems_lisa03"},{"issue":"3","key":"45_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology\u00a015(3), 177\u2013206 (2002)","journal-title":"Journal of Cryptology"},{"key":"45_CR11","unstructured":"McKnight, D.H., Chervany, N.L.: The meanings of trust. MISRC Working Paper Series, Technical Report 94-04, arlson School of Management, University of Minnesota (1996)"},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (sbgp). IEEE JSAC Special Issue on Network Security (2000)","DOI":"10.1109\/49.839934"},{"key":"45_CR13","unstructured":"Meiyuan, Z., Smith, S.W., Nicol, D.M.: Evaluating the Performance Impact of PKI on BGP Security. In: The 4th Annual PKI Research and Development Workshop (April 2005)"},{"key":"45_CR14","unstructured":"Internet Routing Registries, http:\/\/www.irr.net\/"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"1","key":"45_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/65.750447","volume":"13","author":"R. Govindan","year":"1999","unstructured":"Govindan, R., Alaettinoglu, C., Eddy, G., Kessens, D., Kumar, S.: An architecture for stable, analyzable Internet routing. IEEE Network\u00a013(1), 29\u201335 (1999)","journal-title":"IEEE Network"},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"Battista, G.D., Refice, T., Rimondini, M.: How to extract BGP peering information from the internet routing registry. In: ACM SIGCOMM 2006 workshops, September 11-15, 2006 (2006)","DOI":"10.1145\/1162678.1162685"},{"key":"45_CR18","unstructured":"Siganos, G., Faloutsos, M.: Analyzing BGP policies: Methodology and tool. In: INFOCOM 2004 (2004)"},{"key":"45_CR19","unstructured":"Feamster, N., Balakrishnan, H.: Detecting BGP configuration faults with static analysis.In: Proc. Networked Systems Design and Implementation (May 2005)"},{"key":"45_CR20","unstructured":"Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., McDaniel, P., Rubin, A.: Working around bgp: An incremental approach to improving security and accuracy of Inter-domain routing. In: NDSS (2003)"},{"key":"45_CR21","unstructured":"Yu, H., Rexford, J., Felten, E.W.: A Distributed Reputation Approach to Cooperative Internet Routing Protection. In: 1st IEEE ICNP Workshop on Secure Network Protocols, 2005 (NPSec) (2005)"},{"key":"45_CR22","unstructured":"Akashi, O., Hirotsu, T., Sato, K., Kourai, K., Maruyama, M.: Sugawara: Agents Support for Flexible Inter-AS Policy Control. In: Proc. of the 2003 Symposium on Applications and the Internet Workshops (SAINT-w 2003) (2003)"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Akashi, O., Fukuda, K., Hirotsu, T., Sugawara, T.: Policy-based BGP Control Architecture for Autonomous Routing Management. In: SIGCOMM 2006 Workshops, Pisa, Italy, September 11-15, 2006 (2006)","DOI":"10.1145\/1162638.1162651"},{"key":"45_CR24","unstructured":"Mizuguchi, T., Yoshida, T.: Inter-domain Routing Security BGP Route Hijacking. In: APRICOT 2007 (2007)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69295-9_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:34:08Z","timestamp":1620002048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69295-9_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692942","9783540692959"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69295-9_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}