{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:10:04Z","timestamp":1739319004450,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_16","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:25:17Z","timestamp":1251977117000},"page":"186-201","source":"Crossref","is-referenced-by-count":1,"title":["A2M: Access-Assured Mobile Desktop Computing"],"prefix":"10.1007","author":[{"given":"Angelos","family":"Stavrou","sequence":"first","affiliation":[]},{"given":"Ricardo A.","family":"Barrato","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Citrix ICA Technology Brief. Technical White Paper, Boca Research (1999)"},{"key":"16_CR2","unstructured":"Cumberland, B., Carius, G., Muir, A.: Microsoft Windows NT Server 4.0, Terminal Server Edition: Technical Reference. Microsoft Press (August 1999)"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/4236.656066","volume":"2","author":"T. Richardson","year":"1998","unstructured":"Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing\u00a02(1), 33\u201338 (1998)","journal-title":"IEEE Internet Computing"},{"key":"16_CR4","unstructured":"DoS-Resistant Internet Working Group Meetings (February 2005), http:\/\/www.communicationsresearch.net\/dos-resistant"},{"key":"16_CR5","unstructured":"Hulme, G.: Extortion online. Information Week (September 13, 2004)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: Secure Overlay Services. In: Proceedings of ACM SIGCOMM, August 2002, pp. 61\u201372 (2002)","DOI":"10.1145\/633025.633032"},{"key":"16_CR7","unstructured":"Andersen, D.G.: Mayday: Distributed Filtering for Internet Services. In: Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS) (March 2003)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Baratto, R., Potter, S., Su, G., Nieh, J.: MobiDesk: Mobile Virtual Desktop Computing. In: Proceedings of the 10th Annual ACM International Conference on Mobile Computing and Networking (MobiCom) (September 2004)","DOI":"10.1145\/1023720.1023722"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Stavrou, A., Keromytis, A.: Countering DoS Attacks With Stateless Multipath Overlays. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), November 2005, pp. 249\u2013259 (2005)","DOI":"10.1145\/1102120.1102153"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust Management System Version 2. RFC 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"16_CR11","unstructured":"CCITT: X.509: The Directory Authentication Framework. International Telecommunications Union, Geneva (1989)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure Message Authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 216\u2013233. Springer, Heidelberg (1999)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Xuan, D., Chellappan, S., Wang, X.: Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), March 2004, pp. 408\u2013417 (2004)","DOI":"10.1109\/ICDCS.2004.1281606"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Proceedings of the 10th USENIX Security Symposium, August 2001, pp. 9\u201322 (2001)","DOI":"10.21236\/ADA400003"},{"issue":"1","key":"16_CR15","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/592637.592640","volume":"21","author":"J. Nieh","year":"2003","unstructured":"Nieh, J., Yang, S.J., Novik, N.: Measuring Thin-Client Performance Using Slow-Motion Benchmarking. ACM Transactions on Computer Systems (TOCS)\u00a021(1), 87\u2013115 (2003)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"16_CR16","unstructured":"Gummadi, K.P., Madhyastha, H.V., Gribble, S.D., Levy, H.M., Wetherall, D.: Improving the Reliability of Internet Paths with One-hop Source Routing. In: Proceedings of the 6th Symposium on Operating Systems Design & Implementation (OSDI) (December 2004)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Andersen, D.G., Snoeren, A.C., Balakrishnan, H.: Best-Path vs. Multi-Path Overlay Routing. In: Proceedings of the Internet Measurement Conference (October 2003)","DOI":"10.1145\/948205.948218"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Kaella, A., Pang, J., Shaikh, A.: A Comparison of Overlay Routing and Multihoming Route Control. In: Proceedings of ACM SIGCOMM, August\/September 2004, pp. 93\u2013106 (2004)","DOI":"10.1145\/1015467.1015479"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Su, A., Choffnes, D.R., Kuzmanovic, A., Bustamante, F.E.: Drafting Behind Akamai (Travelocity-Based Detouring). In: Proceedings of ACM SIGCOMM, September 2006, pp. 435\u2013446 (2006)","DOI":"10.1145\/1159913.1159962"},{"key":"16_CR20","unstructured":"Ioannidis, J., Bellovin, S.M.: Implementing Pushback: Router-Based Defense Against DDoS Attacks. In: Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS) (February 2002)"},{"key":"16_CR21","unstructured":"Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. In: Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), February 2001, pp. 3\u201312 (2001)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: Proceedings of ACM SIGCOMM, August 2000, pp. 295\u2013306 (2000)","DOI":"10.1145\/347059.347560"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Kent, S., Strayer, W.: Hash-Based IP Traceback. In: Proceedings of ACM SIGCOMM (August 2001)","DOI":"10.1145\/383059.383060"},{"key":"16_CR24","unstructured":"Li, J., Sung, M., Xu, J., Li, L.: Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2004)"},{"key":"16_CR25","unstructured":"Reiher, P., Mirkovic, J., Prier, G.: Attacking DDoS at the source. In: Proceedings of the 10th IEEE International Conference on Network Protocols (November 2002)"},{"key":"16_CR26","unstructured":"Yaar, A., Perrig, A., Song, D.: An Endhost Capability Mechanism to Mitigate DDoS Flooding Attacks. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2004)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., Govindan, R.: COSSACK: Coordinated Suppression of Simultaneous Attacks. In: Proceedings of DISCEX III, April 2003, pp. 2\u201313 (2003)","DOI":"10.1109\/DISCEX.2003.1194868"},{"issue":"4","key":"16_CR28","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/1282427.1282413","volume":"37","author":"B. Parno","year":"2007","unstructured":"Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B., Hu, Y.C.: Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM Comput. Commun. Rev.\u00a037(4), 289\u2013300 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Baratto, R., Kim, L., Nieh, J.: THINC: A Virtual Display Architecture for Thin-Client Computing. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP) (October 2005)","DOI":"10.1145\/1095810.1095837"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), October 2003, pp. 8\u201319 (2003)","DOI":"10.1145\/948109.948114"},{"key":"16_CR31","unstructured":"Stavrou, A., Keromytis, A.D., Nieh, J., Misra, V., Rubenstein, D.: MOVE: An End-to-End Solution To Network Denial of Service. In: Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), February 2005, pp. 81\u201396 (2005)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Khattab, S.M., Sangpachatanaruk, C., Moss, D., Melhem, R., Znati, T.: Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), March 2004, pp. 238\u2013337 (2004)","DOI":"10.1109\/ICDCS.2004.1281598"},{"key":"16_CR33","unstructured":"Scheifler, R.W., Gettys, J.: X Window System, 3rd edn. Digital Press (1992)"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Schmidt, B.K., Lam, M.S., Northcutt, J.D.: The interactive performance of SLIM: a stateless, thin-client architecture. In: 17th ACM Symposium on Operating Systems Principles (SOSP), December 1999, vol.\u00a034, pp. 32\u201347 (1999)","DOI":"10.1145\/319151.319154"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Lai, A., Nieh, J.: Limits of Wide-Area Thin-Client Computing. In: Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), June 2002, pp. 228\u2013239 (2002)","DOI":"10.1145\/511334.511363"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:42:08Z","timestamp":1739317328000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}