|Publisher version (open access)||465 KB||Adobe Acrobat PDF||View/Open
Please use this identifier to cite or link to this item: http://hdl.handle.net/1959.13/29348
- Application based meta tagging of network connections
- Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filter outgoing network connections based on attributes such as the destination IP address and port number of the connection. With the increase in multi-user systems such as grid networks and shared Web hosting, the complexity of these tasks has increased. Current operating systems lack the ability to determine the intent of a network connection based on the connection's technical characteristics alone. This paper presents a new mechanism by which applications themselves are given the ability to pass meta information to the network subsystem, allowing it to take advantage of application specific data.
- 5th International Conference on Information Technology: New Generations (ITNG 2008) . Proceedings of the Fifth International Conference on Information Technology: New Generations (Las Vegas, NV 7-9 April, 2008) p. 384-389
- Publisher Link
- IEEE Computer Society
- Resource Type
- conference paper
- Copyright © 2008 IEEE. Reprinted from the Proceedings of the Fifth International Conference on Information Technology: New Generations 2008. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Newcastle's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to firstname.lastname@example.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
- Full Text