Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking 2011
DOI: 10.1145/2018584.2018586
|View full text |Cite
|
Sign up to set email alerts
|

Naming in content-oriented architectures

Abstract: There have been several recent proposals for content-oriented network architectures whose underlying mechanisms are surprisingly similar in spirit, but which differ in many details. In this paper we step back from the mechanistic details and focus only on the area where the these approaches have a fundamental difference: naming. In particular, some designs adopt a hierarchical, humanreadable names, whereas others use self-certifying names. When discussing a network architecture, three of the most important req… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
107
0
9

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 160 publications
(116 citation statements)
references
References 9 publications
(17 reference statements)
0
107
0
9
Order By: Relevance
“…Information centric networking (ICN) proposes self-verifying names (SVNs) as an alternative to NLNs (Ahlgren et al, 2012), so making possible to check the relationship between the named entity and the name at any time. Furthermore, Ghodsi et al (Ghodsi et al, 2011) argue that SVNs have better security, scalability, and flexibility than NLNs. SVNs can also support provenance, non repudiation, and integrity of IoT data and its sources.…”
Section: Related Work and Requirementsmentioning
confidence: 99%
“…Information centric networking (ICN) proposes self-verifying names (SVNs) as an alternative to NLNs (Ahlgren et al, 2012), so making possible to check the relationship between the named entity and the name at any time. Furthermore, Ghodsi et al (Ghodsi et al, 2011) argue that SVNs have better security, scalability, and flexibility than NLNs. SVNs can also support provenance, non repudiation, and integrity of IoT data and its sources.…”
Section: Related Work and Requirementsmentioning
confidence: 99%
“…Information can also be characterised by ownership. So far, work in this area has focused on the support of authenticity (or provenance), i.e., enabling users to verify that the received content came from the original source [9], [3]. However, recent research efforts have pointed out the need for supporting content neutrality (see Section II) [4].…”
Section: Exposed Information a From Content Identifiers To Contmentioning
confidence: 99%
“…As discussed in [3], the exposure of ownership information depends on the selected naming scheme. With self-certifying names, the binding between the content name and the owner identity must be established by an external authority, while with human-readable hierarchical names the binding is intrinsic in the name.…”
Section: Handling Ownership Informationmentioning
confidence: 99%
See 2 more Smart Citations