Preventing unauthorized access in information centric networking
نویسندگان
چکیده
منابع مشابه
Toward Privacy-preserving Content Access Control for Information Centric Networking
searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggesstions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Hi...
متن کاملI-CAN: Information-Centric Access Networking* Architecture and Experiments
We present the Information-Centric Access Network (I-CAN) architecture, which is based on the publishsubscribe Information-Centric Networking (ICN) paradigm, identifying how it accounts for specific characteristics of mobile and wireless access networks. We also present initial results from the testbed implementation of two application scenarios that exploit key features of the I-CAN architectu...
متن کاملCaching in Information-Centric Networking
Information-Centric Networking is (ICN) [1] gained increasingly concerns, as an important direction of the Future Internet Architecture research. Although In-network caching is considered as one of the most significant properties of ICN, the cache policy for ICN is still little explored. In this paper, to explor the properties of the optimal cache policy, we formulate the in-network caching pro...
متن کاملPreventing Unauthorized Data Flows
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...
متن کاملInformation-Centric Networking: Baseline Scenarios
This document aims at establishing a common understanding about a set of scenarios that can be used as a base for the evaluation of different information-centric networking (ICN) approaches so that they can be tested and compared against each other while showcasing their own advantages. Towards this end, we review the ICN literature and document scenarios which have been considered in previous ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Privacy
سال: 2018
ISSN: 2475-6725
DOI: 10.1002/spy2.33