Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where D. Scott Alexander is active.

Publication


Featured researches published by D. Scott Alexander.


Journal of Communications and Networks | 2001

The price of safety in an active network

D. Scott Alexander; Paul B. Menage; Angelos D. Keromytis; William A. Arbaugh; Kostas G. Anagnostakis; Jonathan M. Smith

Security is a major challenge for “Active Networking,” as accessible programmability creates numerous opportunities for mischief. The point at which programmability is exposed, e.g., through the loading and execution of code in network elements, must therefore be carefully crafted to ensure security. The SwitchWare active networking research project has studied the architectural implications of various tradeoffs between performance and security. Namespace protection and type safety were achieved with a module loader for active networks, ALIEN, which carefully delineated boundaries for privilege and dynamic updates. ALIEN supports two extensions, the Secure Active Network Environment (SANE), and the Resource Controlled Active Network Environment (RCANE). SANE extends ALIENs node protection model into a distributed setting, and uses a secure bootstrap to guarantee integrity of the namespace protection system. RCANE provides resource isolation between active network node users, including separate heaps and robust time-division multiplexing of the node. The SANE and RCANE systems show that convincing active network security can be achieved. This paper contributes a measurement-based analysis of the costs of such security with an analysis of each system based on both execution traces and end-to-end behavior.


Communications of The ACM | 2015

Programming the quantum future

Benoît Valiron; Neil J. Ross; Peter Selinger; D. Scott Alexander; Jonathan M. Smith

The Quipper language offers a unified general-purpose programming framework for quantum computation.


Lecture Notes in Computer Science | 1999

The Architecture of ALIEN

D. Scott Alexander; Jonathan M. Smith

The ALIEN architecture exposes all node-resident features to modification by a module loader, with the exception of the loader itself. As a structuring principle, ALIEN divides its loadable portions into a privileged loader-initiated Core Switchlet and an unprivileged collection of libraries which use the Core Switchlet and are loaded by it. The loader, Core Switchlet and libraries comprise the network-resident functionality of ALIEN.


IEEE Communications Magazine | 2009

The dynamic community of interest and its realization in ZODIAC

D. Scott Alexander; Yuu-Heng Cheng; Brian A. Coan; Andrei Ghetie; Vikram Kaul; Bruce Siegell; Steven Michael Bellovin; Nicholas F. Maxemchuk; Henning Schulzrinne; Stephen Schwab; Angelos Stavrou; Jonathan M. Smith

The ZODIAC project has been exploring a security first approach to networking based on a new idea, the dynamic community of interest, based on groups of users with a demonstrable need to know. ZODIAC uses the most challenging network setting (the mobile ad hoc network) as a target, since each node must incorporate functions of both hosts and routers. The realization of the DCoI is a work in progress, but initial implementation results have shown that DCoI concepts can be translated into working systems. The current system applies virtual machine containers, extensive use of cryptography and digital signatures, dispersity routing, DHT-based naming, and explicit rate control among other advanced techniques. Putting security to the forefront in the design has led to interesting consequences for naming, authorization, and connection setup. In particular, it has demanded a hierarchical structure for DCoIs that may initially appear somewhat alien to Internet users. Nonetheless, our implementation has illustrated that a highly available network that provides confidentiality and integrity can be constructed and made usable.


Quantum Information Processing | 2017

Concrete resource analysis of the quantum linear-system algorithm used to compute the electromagnetic scattering cross section of a 2D target

Artur Scherer; Benoît Valiron; Siun-Chuon Mau; D. Scott Alexander; Eric van den Berg; Thomas E. Chapuran

We provide a detailed estimate for the logical resource requirements of the quantum linear-system algorithm (Harrow et al. in Phys Rev Lett 103:150502, 2009) including the recently described elaborations and application to computing the electromagnetic scattering cross section of a metallic target (Clader et al. in Phys Rev Lett 110:250504, 2013). Our resource estimates are based on the standard quantum-circuit model of quantum computation; they comprise circuit width (related to parallelism), circuit depth (total number of steps), the number of qubits and ancilla qubits employed, and the overall number of elementary quantum gate operations as well as more specific gate counts for each elementary fault-tolerant gate from the standard set


ieee international symposium on policies for distributed systems and networks | 2009

The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET

Yuu-Heng Cheng; Mariana Raykova; Alexander Poylisher; D. Scott Alexander; Martin I. Eiger; Steven Michael Bellovin


self-adaptive and self-organizing systems | 2015

Self Adaptive Robust Resource Allocation for Prioritized TCP Flows in Wireless Networks

Eric Van Den Berg; Isil Sebuktekin; Miriam Tauil; Andrei Ghetie; D. Scott Alexander

\{ X, Y, Z, H, S, T, \text{ CNOT } \}


acm special interest group on data communication | 1997

Active bridging

D. Scott Alexander; Marianne Shaw; Scott M. Nettles; Jonathan M. Smith


Archive | 1997

Active network encapsulation protocol (anep)

D. Scott Alexander; Bob Braden; Carl A. Gunter; Alden W. Jackson; Angelos D. Keromytis; Gary J. Minden; David Wetherall

{X,Y,Z,H,S,T,CNOT}. In order to perform these estimates, we used an approach that combines manual analysis with automated estimates generated via the Quipper quantum programming language and compiler. Our estimates pertain to the explicit example problem size


IEEE Communications Magazine | 1998

Safety and security of programmable network infrastructures

D. Scott Alexander; William A. Arbaugh; Angelos D. Keromytis; Jonathan M. Smith

Collaboration


Dive into the D. Scott Alexander's collaboration.

Top Co-Authors

Avatar

Jonathan M. Smith

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benoît Valiron

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pankaj Kakkar

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge