DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
Trusted Overlay Networks
Trusted Overlay Networks
Goals
Members
Schedule
Related links
- Development of Security-Quality Guarantee Technology in Resilient Networks
- A. Quantify Security-Quality
- B. TON Architecture
- Router Virtualization
- Routing protocol based on Security-Quality
- Resouce allocation between TONs
- C. Resilient Networks
- Year 1: Define Security-Quality & Develop basic technologies of supporting Security-Quality
- Quantify Security-Quality
- Develop Router Virtualization
- Develop self-diagnosis
- Develop dynamic resource allocation
- Develop detecting distributed attack
- Year 2: Develop core technologies of TON's components
- Design Security-Quality support protocol
- Realize testbed of TON for developing Router Virtualization
- Design routing protocol based on credit
- Research on flow contorl between TON
- Research on attack isolation & block
- Year 3: Development core components of Resilient Networks
- Research on user authentication based on Security-Quality
- Design routing protocol based on Accountability
- Research on core components of Resilient Networks using TON
Last modified: 2008.3.23