{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:34:20Z","timestamp":1729658060954,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/infcom.2004.1354678","type":"proceedings-article","created":{"date-parts":[[2005,2,22]],"date-time":"2005-02-22T15:29:50Z","timestamp":1109086190000},"page":"2583-2593","source":"Crossref","is-referenced-by-count":0,"title":["IP easy-pass: edge resource access control"],"prefix":"10.1109","volume":"4","author":[{"family":"Haining Wang","sequence":"first","affiliation":[]},{"given":"A.","family":"Bose","sequence":"additional","affiliation":[]},{"given":"M.","family":"El-Gendy","sequence":"additional","affiliation":[]},{"given":"K.G.","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176297"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832178"},{"key":"17","article-title":"Security architecture for the internet prtocotl","author":"kent","year":"1998","journal-title":"RFC 2401"},{"journal-title":"VoIP Bandwidth White Paper","year":"0","key":"36"},{"key":"18","article-title":"IP security document roadmap","author":"thayer","year":"1998","journal-title":"RFC 2411"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.805028"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019332"},{"key":"34","article-title":"MediaPlayer versus RealPlayer a comparison of network turbulence","author":"li","year":"2002","journal-title":"Proceedings of ACM Internet Measurement Workshop'2002"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-60590-8_7","article-title":"The RC5 encryption algorithm","volume":"1008","author":"rivest","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"The ARQoS Project","year":"0","key":"13"},{"journal-title":"The Authenticated QoS Project","year":"0","key":"14"},{"key":"11","article-title":"An architecture for differentiated services","author":"blake","year":"1998","journal-title":"RFC 2475"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/65.238150"},{"key":"21","article-title":"A study of the relative costs of network security protocols","author":"miltchev","year":"2002","journal-title":"Proceedings of the USENIX Annual Technical Conference'2002 Freenix Track"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2003.1203741"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012363"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1145\/347057.347400","article-title":"Endpoint admission control: Architectural issues and performance","author":"breslau","year":"2000","journal-title":"Proc ACM SIGCOMM 2000"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/49.898741"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/90.554722"},{"key":"26","article-title":"Resource containers: A new facility for resource management in server systems","author":"banga","year":"1999","journal-title":"Proceedings of USENIX OSDI'99"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060295"},{"key":"28","article-title":"Defending against denial of service attacks in Scout","author":"spatscheck","year":"1999","journal-title":"Proceedings of USENIX OSDI'99"},{"key":"29","article-title":"An expedited forwarding PHB (per-hop behavior)","author":"davie","year":"2002","journal-title":"RFC 3246"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"journal-title":"Denial-of-service Development","year":"2000","key":"1"},{"key":"30","article-title":"Security threats for NSIS","author":"tschofenig","year":"2003","journal-title":"Internet Draft Drafi-ietf-nsis-threats-01 txt"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.966195"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383061","article-title":"On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets","author":"park","year":"2001","journal-title":"Proc of the ACM SIGCOMM 2001"},{"journal-title":"Rc5-64 Project","year":"2002","key":"32"},{"key":"5","article-title":"SAVE: Source address validity enforcement protocol","author":"li","year":"2002","journal-title":"Proceedings of IEEE INFOCOM '2002"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44884-5_2","article-title":"Statistical characterization for per-hop QoS","author":"el-gendy","year":"2003","journal-title":"Proceedings of IWQoS' 2003"},{"key":"4","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","author":"ferguson","year":"1998","journal-title":"RFC 2267"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233710"},{"key":"8","article-title":"IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks","author":"sung","year":"2002","journal-title":"Proceedings of of IEEE ICNP '2002"}],"event":{"name":"IEEE INFOCOM 2004","acronym":"INFCOM-04","location":"Hong Kong, China"},"container-title":["IEEE INFOCOM 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9369\/29753\/01354678.pdf?arnumber=1354678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T12:08:54Z","timestamp":1497614934000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1354678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/infcom.2004.1354678","relation":{},"subject":[]}}