[1] Nagswara S. V Rao, et al. “NetLets: Measurement-based Routing Daemons for Low End-to-end Delays Over Networks,” Computer Communications Vol. 26, No. 8, 2003, pp. 834-844.
[2] D. Nesset, “Factors Affecting Distributed System Security,” IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, 1987, pp. 233-248.
[3] Haixin Duan and Jianping Wu, “Entity Security Architect Structure in Computer Network,” Transactions on Computer, Vol. 24, No. 8, August 2001, pp. 147-155.
[4] V Paxsion1 “End2to2end routing be-havior in the Internet1 IEEE/ACM Transaction on Net-working,” Vol. 5, No. 5, 1997, pp. 601-615.
[5] Liotine Matthew, “Mission-critical Network Planning,” Artech House Inc., London, 2003.
[6] S Muftic and M. Sloman, “Security Architecture for Distributed Systems,” Computer Communications, Vol. 17, No. 7, 1994, pp. 492-500.
[7] D. Nesset. “Factors Affecting Distributed System Security,” IEEE Transaction on Software Engi-neering, Vol. 13, No. 2, 1987, pp. 233-247.
[8] Joe “Touch Dynamic Internet Overlay Deployment and Management Using the X-Bone,” Computer Networks, Vol. 57, No. 5, 2001, PP. 117-135.
[9] R Forder, The Future of Defense Analysis,” Journal of Defense Science, Vol. 2, No. 1, 2000, pp. 215-226.
[10] Kimberly Hollo-man, “The Network Centric Operations Conceptual Framework,” Proceeding of Network Centric Warfare 2004 Conference, Washington, D. C., 2004, pp. 3-12.
[11] A. S. Tannenbaum, “Computer Networks,” 4th Edition, Machine Press, Beijing, 2004.
[12] D. Comer and D. Stevens, “Internetworking with TCP/IP, Volume II: Design Implementation and Internals,” 2nd Edition, Prentice Hall, New Jersey, 1994.
[13] S. Giordano, M. Potts and M. Smirnov. “Advances in QoS,” IEEE Com-munications Magazine, Vol. 41, No. 1, 2003, pp. 137-141.
[14] S. Kent and R. Atkinson, “IP Security for the Internet Protocol,” 1998. http://www.ietf.org/rfc/ rfc24011.txt
[15] M. Leech, M. Ganis, Y. Lee, et al. “SOCKS protocol,” 1996. http://www.ietf.org/rfc/ rfc1928.txt
[16] T. Dierks and C. Allen. “The TLS Pro-tocol,” 1999, http://www.ietf.org/rfc/ rfc2246.txt
[17] F. Chung, “Reliable Software and Communication I: an Overview,” IEEE Journal on Selected Areas in Commu-nications, Vol. 12, No. 1, 1994, pp. 23-32.
[18] B. Coan and D. Heyman. “Reliable Software and Communication III: Congestion Control and Network Reliability,” IEEE Journal on Selected Areas in Communications, Vol. 12, No. 1, 2002, pp. 40-45.
[19] Elham Ghashghai and Ro-nald L. Rardin, Using a Hybrid of Exact and Genetic Al-gorithms to Design Survivable Networks, Computers and Operations Research, Vol. 29, No. 1, 2002, pp. 53-66.