Corpus ID: 167757374

INSTITUTO TECNOL ´ OGICO Y DE ESTUDIOS

@inproceedings{Monterrey2005INSTITUTOT,
  title={INSTITUTO TECNOL ´ OGICO Y DE ESTUDIOS},
  author={S. D. Monterrey},
  year={2005}
}
The internet is the largest distributed system ever built. The internet is organized in a multitude of administratively independent networks called Autonomous Systems (ASes). An AS can be an Internet Service Provider (ISP), an important educational institution or a corporate network. Internet routing is implemented using a distributed system composed of many routers, grouped into administrative domains, the ASes. Routing information is exchanged between ASes using Border Gateway Protocol (BGP… 
5 Citations
E-Governance as an Anti Corruption Tool : Korean Cases
Corruption is an impediment for development and good governance. It is more than true especially in the least developed countries(LDC), and emerging and development economies (EDE). Academics have
Can E-governance hold back the Relationships between Stakeholders of Corruption? An Empirical Study of a Developing Country *
The developing countries are suffering from severe corruption, which decreases the rate of foreign direct investment (FDI) along with per capita income, and increases the gap between rich and poor.
The Relation of Corruption Perceptions, Conformity and Traditionalism: Macroeconomic Study of 52 Countries
This paper analyses the relation of the subjective importance of values such as creativity, being rich, taking care of ourselves, helping others, being successful, excitement and adventure, behaving
Parasitical cultures? The cultural origins of institutions and development
Do cultural attitudes affect institutions and economic performance? This paper suggests they do. To measure the impact of cultural attitudes we use prevalence rates of the common parasite Toxoplasma

References

SHOWING 1-10 OF 779 REFERENCES
Analyzing BGP policies: methodology and tool
TLDR
A methodology and a tool to extract and infer information from IRR and validate it against BGP routing tables and finds that IRR has a lot of inaccuracies, but also contains significant and unique information.
Protecting BGP routes to top level DNS servers
TLDR
This paper proposes a path-filtering approach to protect the routes to the critical top level DNS servers and exploits the high degree of redundancy in top level DNSSEC servers and also exploits the observation that popular destinations, including toplevel DNS servers, are well connected via stable routes.
Performance evaluation of distributed security protocols using discrete event simulation
TLDR
This thesis evaluated the performance of BGP security protocols and PKI systems, identified performance problems of Secure BGP, and proposed and evaluated Signature Amortization and Aggregated Path Authentication schemes that significantly improve efficiency of S-BGP without compromising security.
On inferring autonomous system relationships in the internet
  • L. Gao
  • Computer Science
    TNET
  • 2001
TLDR
An augmented AS graph representation is proposed that classifies AS relationships into customer-provider, peering, and sibling relationships, and presents heuristic algorithms that infer AS relationships from BGP routing tables.
Study of Internet autonomous system interconnectivity from BGP routing tables
TLDR
Well-known heuristics are used to identify AS peeringship and split the Internet core from small regional ISPs and end customers, and it is seen that the Internetcore does not fit a power-law well.
Routing in the Internet
TLDR
This paper presents an introduction to Routing in the Internet, focusing on RIP and OSPF and the Structure of Interconnections, and the structure of Multicast Routing.
Secure Border Gateway Protocol (S-BGP)
TLDR
A secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP is described.
DNS and BIND
TLDR
This edition brings you up to date on the new 9.1.0 and 8.2.3 versions of BIND along with the older 4.9 version, and includes more extensive coverage of NOTIFY, IPv6 forward and reverse mapping, transaction signatures, and the new DNS Security Extensions.
Secure Border Gateway Protocol (Secure-BGP)
TLDR
A secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP is described.
DNS and BIND (5th Edition)
DNS and BIND tells you everything you need to work with one of the Internet's fundamental building blocks: the distributed host information database that's responsible for translating names into
...
1
2
3
4
5
...