- Andersen, D.G. et al. Accountable Internet Protocol (AIP). In Proceedings of ACM SIGCOMM, 2008. Google ScholarDigital Library
- Bender, A. et al. Accountability as a service. In Proceedings of USENIX SRUTI, 2007. Google ScholarDigital Library
- Andersen, D., Parno, B., and Perrig, A. SNAPP: Stateless network-authenticated path pinning. In Proceedings of AsiaCCS, March 2008. Google ScholarDigital Library
- Flanagan, M., Howe, D.C., and Nissenbaum, H. Embodying Values in Technology: Theory and Practice. Cambridge University Press, Cambridge, 2008, 322--353.Google Scholar
- Lessig, L. Code and Other Laws of Cyberspace. Basic Books, NY, 1999. Google ScholarDigital Library
- Li, A., Liu, X., and Yang, X. Bootstrapping accountability in the Internet we have. In Proceedings of USENIX NSDI, 2011. Google ScholarDigital Library
- Liu, X. et al. Passport: Secure and adoptable source authentication. In Proceedings of USENIX NSDI, 2008. Google ScholarDigital Library
- Mallios, Y. et al. Persona: Network layer anonymity and accountability for next generation Internet. In IFIP TC 11 International Information Security Conference, May 2009.Google Scholar
- Naous, J. et al. Verifying and enforcing network paths with ICING. In Proceedings of ACM CoNEXT, 2011. Google ScholarDigital Library
- Nissenbaum, H. How computer systems embody values. IEEE Computer 34, 3 (2001), 118--120. Google ScholarDigital Library
- Zhou, W. et al. Secure network provenance. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), October 2011. Google ScholarDigital Library
- Zhou, W. et al. Distributed time-aware provenance. In Proceedings of the International Conference on Very Large Databases (VLDB), August 2013.Google Scholar
Index Terms
- Accountability in future internet architectures
Comments