Preventing unauthorized access in information centric networking

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward Privacy-preserving Content Access Control for Information Centric Networking

searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggesstions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Hi...

متن کامل

I-CAN: Information-Centric Access Networking* Architecture and Experiments

We present the Information-Centric Access Network (I-CAN) architecture, which is based on the publishsubscribe Information-Centric Networking (ICN) paradigm, identifying how it accounts for specific characteristics of mobile and wireless access networks. We also present initial results from the testbed implementation of two application scenarios that exploit key features of the I-CAN architectu...

متن کامل

Caching in Information-Centric Networking

Information-Centric Networking is (ICN) [1] gained increasingly concerns, as an important direction of the Future Internet Architecture research. Although In-network caching is considered as one of the most significant properties of ICN, the cache policy for ICN is still little explored. In this paper, to explor the properties of the optimal cache policy, we formulate the in-network caching pro...

متن کامل

Preventing Unauthorized Data Flows

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

متن کامل

Information-Centric Networking: Baseline Scenarios

This document aims at establishing a common understanding about a set of scenarios that can be used as a base for the evaluation of different information-centric networking (ICN) approaches so that they can be tested and compared against each other while showcasing their own advantages. Towards this end, we review the ICN literature and document scenarios which have been considered in previous ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Privacy

سال: 2018

ISSN: 2475-6725

DOI: 10.1002/spy2.33