15,566 Hits in 6.4 sec

Up-to-date key retrieval for information centric networking

Giulia Mauri, Giacomo Verticale
2017 Computer Networks  
This paper discusses how to retrieve up-todate signing keys in the ICN scenario.  ...  We consider three possible approaches to distribute up-to-date keys in a similar way to the current CRL and OCSP.  ...  The Up-to-Date Key Retrieval Security Problem Assumptions 1.  ... 
doi:10.1016/j.comnet.2016.10.018 fatcat:sy27iowfd5brzn7iy32myvcvvi

Social network based security scheme in mobile information-centric network

You Lu, Zhiyang Wang, Yu-Ting Yu, Ruolin Fan, Mario Gerla
2013 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)  
With the spread of mobile Internet, users have increased opportunities to retrieve content from the content producer via the application in mobile informationcentric network.  ...  In this paper, we propose a social network based security scheme to verify the public-key and producer identity binding.  ...  Information-Centric Network Information-centric network is an alternative approach to the architecture of IP-based computer networks.  ... 
doi:10.1109/medhocnet.2013.6767402 dblp:conf/medhocnet/LuWYFG13 fatcat:mf2ktsnwjrf57g757v3oul4kie

Networking Group Content: RESTful Multiparty Access to a Data-centric Web of Things [article]

Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch
2021 arXiv   pre-print
Information-centric networking (ICN) introduced hop-wise multi-party dissemination of cacheable content, which has proven valuable in particular for low-power lossy networking regimes.  ...  In this paper, we explore how multiparty content distribution in an information-centric Web of Things (WoT) can be built on CoAP.  ...  This work was supported in part by the German Federal Ministry for Education and Research (BMBF) within the projects I3 -Information Centric Networking for the Industrial Internet and the Hamburg  ... 
arXiv:2104.01587v1 fatcat:4jky74jcsrahfe66mrgwsbsowm

Digital forgetting in information-centric networks—the CONVERGENCE perspective

Fernando Almeida, Helder Castro, Maria T. Andrade, Giuseppe Tropea, Nicola Blefari Melazzi, Salvatore Signorello, Aziz Mousas, Angelos Anadiotis, Dimitra Kaklamani, Iakovos Venieris, Sam Minelli, Angelo Difino
2014 New Review of Hypermedia and Multimedia  
The work presented in this paper strives for a new information persistence paradigm, whereby the enforcement of "digital forgetting" is implemented over an information-centric model for the Internet.  ...  In many situations, as the years go by, information released loses relevance or people may decide they no longer want others to access information they have previously published.  ...  Digital forgetting in information-centric networks In the first scenario, the CONVERGENCE system defines a default expiry date for all the Publish VDIs published to the CONVERGENCE system.  ... 
doi:10.1080/13614568.2013.877088 fatcat:gik3j2k43jchfd2wl2g3v4ukb4

A survey of mobility in information-centric networks

Gareth Tyson, Nishanth Sastry, Ruben Cuevas, Ivica Rimac, Andreas Mauthe
2013 Communications of the ACM  
This is because a host-centric network (e.g. the Internet) is designed to route packets from a source to a destination, whilst an information-centric network is designed to deliver information from a provider  ...  Thus, mobility can often require the reestablishment of these connection-oriented sessions so that both parties are aware of the up-to-date network addresses, as well as any pertinent parameters.  ... 
doi:10.1145/2500501 fatcat:r2b4zmaazvdc5ml5wf7sptb6cq

Decoupling information and connectivity via information-centric transport

Hila Ben Abraham, Jyoti Parwatikar, John DeHart, Adam Drescher, Patrick Crowley
2018 Proceedings of the 5th ACM Conference on Information-Centric Networking - ICN '18  
The power of Information-Centric Networking (ICN) architectures lies in their abstraction for communication -the request for named data.  ...  In this paper, we define the role of forwarding strategies, and we introduce Information-Centric Transport (ICT) as an abstraction for cleanly decoupling the information plane from the connectivity plane  ...  The authors would also like to thank the anonymous reviewers for their valuable comments and helpful suggestions.  ... 
doi:10.1145/3267955.3267963 dblp:conf/acmicn/AbrahamPDDC18 fatcat:xqxmuoeotbeh3fifiviysei7hm

The product centric approach: a solution to supply network information management problems?

Mikko Kärkkäinen, Timo Ala-Risku, Kary Främling
2003 Computers in industry (Print)  
The approach we call product centric information management is based on centralising information to the individual products.  ...  The main reasons for this are the increasing product customisation and increasingly complex supply networks. Product customisation adds to the quantity and specificity of product-related information.  ...  Acknowledgements The authors would like to acknowledge TEKES, Tekniikan edistämissäätiö, Kuorma-autoliikenteen Volvo-säätiö, and Päijät-Hämeen rahasto for the funding of this research.  ... 
doi:10.1016/s0166-3615(03)00086-1 fatcat:6czhu77uzndrdg27qllankbmy4

Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet

Claude Castelluccia, Mohamed Ali Kaafar
2009 2009 Ninth Annual International Symposium on Applications and the Internet  
In this paper, we propose OCN (Owner-Centric Networking), a new Internet architecture that provides individuals control over their contents.  ...  It is introduced in order to allow for an easy look up of the contents.  ...  As an example, we can specify the destination, subject, and dates for an email-type record. The fourth attribute contains the content's public key and is used to enforce access.  ... 
doi:10.1109/saint.2009.34 dblp:conf/saint/CastellucciaK09 fatcat:eexqwh4p2rdfpjalunf4srek6i

Network Layer Solutions for a Content-Centric Internet [chapter]

Andrea Detti, Nicola Blefari-Melazzi
2011 Trustworthy Internet  
In this paper, we identify the main functionalities of a content-centric network (CONET), we discuss pros and cons of literature proposals for an innovative, content-centric network layer and we draw our  ...  To overcome this contrast, research on the Future Internet is exploring novel socalled content-centric architectures, where the network layer directly provides users with contents, instead of providing  ...  P ) is a digest of the public key used by the publisher to sign the data.  ... 
doi:10.1007/978-88-470-1818-1_27 fatcat:7hfppkqfe5g6pjpfjwyowdph2i

Data to the people

Arseny Kurnikov, Teemu Kärkkäinen, Jörg Ott
2013 Proceedings of the 8th ACM MobiCom workshop on Challenged networks - CHANTS '13  
Delay Tolerant Networking (DTN) and Information Centric Networking (ICN) bear numerous similarities.  ...  to evolve through modifications during network partitions.  ...  When receiving such an update, a BPQ-aware node searches for an older response with the corresponding BPQ value and applies the patch to keep it up-to-date.  ... 
doi:10.1145/2505494.2505505 dblp:conf/mobicom/KurnikovKO13 fatcat:cedmrnk34nbcppbomxpscdappq

An Information-Centric Networking based Registry for Decentralized Identifiers and Verifiable Credentials

Bander A. Alzahrani
2020 IEEE Access  
In this paper we design, implement, and evaluate a secure DID/VC registry service using the emerging paradigm of Information Centric Networking (ICN).  ...  Due to ICN's inherent support for multicast and caching, our construction imposes small network overhead, and achieves low lookup times.  ...  As already discussed, it is important for caches to keep cached document up-to-date.  ... 
doi:10.1109/access.2020.3011656 fatcat:6dsn6mk45zdfrmcw7cgzlvreuy

An encryption-based access control framework for content-centric networking

Jun Kuriharay, Ersin Uzun, Christopher A. Wood
2015 2015 IFIP Networking Conference (IFIP Networking)  
This paper proposes a comprehensive encryptionbased access control framework for content centric networking (CCN), called CCN-AC.  ...  This framework is both flexible and extensible, enabling the specification, implementation, and enforcement of a variety of access control policies for sensitive content in the network.  ...  Note that as long as the key-chain is up-to-date, a user can easily check if his ancestors' private keys and decapsulation keys stored by him or cached nearby are valid or expired by their hash values  ... 
doi:10.1109/ifipnetworking.2015.7145300 dblp:conf/networking/KuriharayUW15 fatcat:3k24rjkkkfdy3kmectsbdtsmce

A named data networking flexible framework for management communications

Daniel Corujo, Rui Aguiar, Ivan Vidal, Jaime Garcia-Reinoso
2012 IEEE Communications Magazine  
For testing purposes, we assume that the ME has an up-to-date access control indication of the UE location, its supported access interfaces, and current network conditions on the PoAs at its vicinity.  ...  Recently, information-centric networking (ICN) concepts have defined mechanisms focusing on which information to get rather than where it is located.  ... 
doi:10.1109/mcom.2012.6384449 fatcat:twumxgooljeg7atpmfjsa5rruq

Software Agent-based Intelligence for Code-centric RFID Systems

Min Chen, Sergio Gonzalez-Valenzuela, Qian Zhang, Victor Leung
2010 IEEE Intelligent Systems  
Due to its intrinsic small size and low cost features, the RFID technology can be readily integrated into various systems for future smart environment applications, whereby vital information is retrieved  ...  by diverse types of communications networks.  ...  In addition to the performance improvement in terms of task duration, CRS also provides the flexibility for the user to change the code information on-demand which is always accurate and up-to-date to  ... 
doi:10.1109/mis.2010.10 fatcat:ekbu4s4n2vclfbcou4qkt2qkoe

A Patient-Centric Health Information Exchange Framework Using Blockchain Technology

Yan Zhuang, Lincoln Sheets, Yin-Wu Chen, Zonyin Shae, Jeffrey J. P. Tsai, Chi-Ren Shyu
2020 IEEE journal of biomedical and health informatics  
The Office of the National Coordinator (ONC) for Health Information Technology is seeking patient-centric HIE designs that shift data ownership from providers to patients.  ...  By personalizing data segmentation and an "allowed list" for clinicians to access their data, this design achieves patient-centric HIE.  ...  the date); patients can personalize the data segmentation after retrieving their health records.  ... 
doi:10.1109/jbhi.2020.2993072 pmid:32396110 fatcat:dyqqciimzjg4lfgzo2arh6k66q
« Previous Showing results 1 — 15 out of 15,566 results