Towards Secure Information-centric Naming
نویسندگان
چکیده
The predominant usage of the Internet for content retrieval has lead to a new communication paradigm called information-centric networking (ICN). In this paradigm, the main concern is to fetch content from the network without the explicit knowledge where the content, or its copy, is currently located. Although the migration to the ICN paradigm is already taking place, the underlying naming system and security are still bound to the end-to-end paradigm. In this paper we present a new secure information-centric naming system aiming at explicit trust establish between content providers and consumers and we also discuss some implications and opportunities of this new paradigm.
منابع مشابه
On name-based group communication: Challenges, concepts, and transparent deployment
Human-centric naming will largely facilitate access and deployment of network services in a future Internet. Information-centric networking (ICN) introduces such vision of a name-oriented, secure, globally available publish-subscribe infrastructure. Current approaches concentrate on unicast-like pull mechanisms and thereby fall short of naming and automatically updating content at groups of rec...
متن کاملNaming and sharing resources across administrative boundaries
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that follows hierarchical patterns, such systems interfere with naming and sharing that cross administrative boundaries, and therefore cause headaches for bo...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملTowards Secure Cloud Data Management
This paper explores the security challenges posed by data-intensive applications deployed in cloud environments that span administrative and network domains. We propose a data-centric view of cloud security and discuss data management challenges in the areas of secure distributed data processing, end-to-end query result verification, and cross-user trust policy management. In addition, we descr...
متن کاملFrom Secure Business Process Models to Secure Artifact-Centric Specifications
Making today’s systems secure is an extremely difficult and challenging problem. Socio and technical issues interplay and contribute in creating vulnerabilities that cannot be easily prevented without a comprehensive engineering method. This paper presents a novel approach to support process-aware secure systems modeling and automated generation of secure artifact-centric implementations. It co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011