Nothing Special   »   [go: up one dir, main page]

Fotiou et al., 2012 - Google Patents

Access control enforcement delegation for information-centric networking architectures

Fotiou et al., 2012

View PDF
Document ID
13264047502575851514
Author
Fotiou N
Marias G
Polyzos G
Publication year
Publication venue
Proceedings of the second edition of the ICN workshop on Information-centric networking

External Links

Snippet

Information is the building block of Information Centric Networks (ICNs). Access control policies limit information dissemination to authorized entities only. Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Fotiou et al. Access control enforcement delegation for information-centric networking architectures
Diro et al. Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication
Misra et al. Securing the internet of things
Esposito et al. On security in publish/subscribe services: A survey
Nuñez et al. BlindIdM: A privacy-preserving approach for identity management as a service
Suarez et al. A secure IoT management architecture based on Information-Centric Networking
Li et al. Mandatory content access control for privacy protection in information centric networks
Fotiou et al. Access control as a service for the Cloud
Polyzos et al. Building a reliable internet of things using information-centric networking
Da Silva et al. An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges
Ali et al. A framework for secure and privacy protected collaborative contents sharing using public OSN
Buccafurri et al. Accountability-preserving anonymous delivery of cloud services
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Aiash et al. An integrated authentication and authorization approach for the network of information architecture
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Fotiou et al. Rendezvous‐based access control for information‐centric architectures
Srirama et al. Security analysis of mobile web service provisioning
Si et al. A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem
AlSabah et al. PriviPK: Certificate-less and secure email communication
Núñez-Gómez et al. HyperNet: A conditional k-anonymous and censorship resistant decentralized hypermedia architecture
Salem A secure privacy-preserving mutual authentication scheme for publish-subscribe fog computing
Luntovskyy et al. Security in distributed systems
Al-Shargabi Security engineering for E-government web services: A trust model
Liu et al. A secure and efficient data sharing framework with delegated capabilities in hybrid cloud