2019 2nd International Conference on Hot Information-Centric Networking (HotICN) 2019
DOI: 10.1109/hoticn48464.2019.9063206
|View full text |Cite
|
Sign up to set email alerts
|

CDAC: A Collaborative Data Access Control Scheme in Named Data Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…These strategies are made possible by decentralizing the security operations. Check out [21], [22], [23], and [24] for further information about the utility of these models. In these articles, the development of an Access Control Model with the assistance of smart contracts, the design of a novel attributebased access control scheme via blockchain, a scheme for controlling access to data in a collaborative setting, and a trustand risk-based approach to incorporating security that makes use of behavior, status, and risk parameters to compute trust levels are each discussed in detail.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These strategies are made possible by decentralizing the security operations. Check out [21], [22], [23], and [24] for further information about the utility of these models. In these articles, the development of an Access Control Model with the assistance of smart contracts, the design of a novel attributebased access control scheme via blockchain, a scheme for controlling access to data in a collaborative setting, and a trustand risk-based approach to incorporating security that makes use of behavior, status, and risk parameters to compute trust levels are each discussed in detail.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Liu et al [75] design a collaborative data access control scheme for NDN, where access control function is carried out at routers that may cache content instead of a single content producer. In this approach, the producer encrypts the content using a symmetric key.…”
Section: Cache Enforcement-based Access Controlmentioning
confidence: 99%