Fotiou et al., 2012 - Google Patents
Access control enforcement delegation for information-centric networking architecturesFotiou et al., 2012
View PDF- Document ID
- 13264047502575851514
- Author
- Fotiou N
- Marias G
- Polyzos G
- Publication year
- Publication venue
- Proceedings of the second edition of the ICN workshop on Information-centric networking
External Links
Snippet
Information is the building block of Information Centric Networks (ICNs). Access control policies limit information dissemination to authorized entities only. Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies …
- 238000004891 communication 0 description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fotiou et al. | Access control enforcement delegation for information-centric networking architectures | |
Diro et al. | Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication | |
Misra et al. | Securing the internet of things | |
Esposito et al. | On security in publish/subscribe services: A survey | |
Nuñez et al. | BlindIdM: A privacy-preserving approach for identity management as a service | |
Suarez et al. | A secure IoT management architecture based on Information-Centric Networking | |
Li et al. | Mandatory content access control for privacy protection in information centric networks | |
Fotiou et al. | Access control as a service for the Cloud | |
Polyzos et al. | Building a reliable internet of things using information-centric networking | |
Da Silva et al. | An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges | |
Ali et al. | A framework for secure and privacy protected collaborative contents sharing using public OSN | |
Buccafurri et al. | Accountability-preserving anonymous delivery of cloud services | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Aiash et al. | An integrated authentication and authorization approach for the network of information architecture | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
Fotiou et al. | Rendezvous‐based access control for information‐centric architectures | |
Srirama et al. | Security analysis of mobile web service provisioning | |
Si et al. | A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem | |
AlSabah et al. | PriviPK: Certificate-less and secure email communication | |
Núñez-Gómez et al. | HyperNet: A conditional k-anonymous and censorship resistant decentralized hypermedia architecture | |
Salem | A secure privacy-preserving mutual authentication scheme for publish-subscribe fog computing | |
Luntovskyy et al. | Security in distributed systems | |
Al-Shargabi | Security engineering for E-government web services: A trust model | |
Liu et al. | A secure and efficient data sharing framework with delegated capabilities in hybrid cloud |