Towards Secure Information-centric Naming

نویسندگان

  • Walter Wong
  • Pekka Nikander
چکیده

The predominant usage of the Internet for content retrieval has lead to a new communication paradigm called information-centric networking (ICN). In this paradigm, the main concern is to fetch content from the network without the explicit knowledge where the content, or its copy, is currently located. Although the migration to the ICN paradigm is already taking place, the underlying naming system and security are still bound to the end-to-end paradigm. In this paper we present a new secure information-centric naming system aiming at explicit trust establish between content providers and consumers and we also discuss some implications and opportunities of this new paradigm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On name-based group communication: Challenges, concepts, and transparent deployment

Human-centric naming will largely facilitate access and deployment of network services in a future Internet. Information-centric networking (ICN) introduces such vision of a name-oriented, secure, globally available publish-subscribe infrastructure. Current approaches concentrate on unicast-like pull mechanisms and thereby fall short of naming and automatically updating content at groups of rec...

متن کامل

Naming and sharing resources across administrative boundaries

I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that follows hierarchical patterns, such systems interfere with naming and sharing that cross administrative boundaries, and therefore cause headaches for bo...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Towards Secure Cloud Data Management

This paper explores the security challenges posed by data-intensive applications deployed in cloud environments that span administrative and network domains. We propose a data-centric view of cloud security and discuss data management challenges in the areas of secure distributed data processing, end-to-end query result verification, and cross-user trust policy management. In addition, we descr...

متن کامل

From Secure Business Process Models to Secure Artifact-Centric Specifications

Making today’s systems secure is an extremely difficult and challenging problem. Socio and technical issues interplay and contribute in creating vulnerabilities that cannot be easily prevented without a comprehensive engineering method. This paper presents a novel approach to support process-aware secure systems modeling and automated generation of secure artifact-centric implementations. It co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011