2010 INFOCOM IEEE Conference on Computer Communications Workshops 2010
DOI: 10.1109/infcomw.2010.5466661
|View full text |Cite
|
Sign up to set email alerts
|

Secure Naming for a Network of Information

Abstract: Several projects propose an information-centric approach to the network of the future. Such an approach makes efficient content distribution possible by making information retrieval host-independent and integrating into the network storage for caching information. Requests for particular content can, thus, be satisfied by any host or server holding a copy. The current security model based on host authentication is not applicable in this context. Basic security functionality must instead be attached directly to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(44 citation statements)
references
References 17 publications
(18 reference statements)
0
44
0
Order By: Relevance
“…For dynamic content, NetInf can use, e.g., signed manifests. For more details on NetInf security, see [Dannewitz10].…”
Section: Authenticationmentioning
confidence: 99%
“…For dynamic content, NetInf can use, e.g., signed manifests. For more details on NetInf security, see [Dannewitz10].…”
Section: Authenticationmentioning
confidence: 99%
“…This public-private key pair is taken as a binding to the content or an information object. The basic naming structure of NetInf [42] Every part in the structure can be considered as a hash which then allows for self-certification. In addition to that it also allows different type of a string data type therefore allowing the normal Uniform Resource Locators (URLs) [39].The NetInf requires that, a subscription have to match with the publication only if the actual name on the network is found to be similar with the matching pair between that of the subscriber and a publisher otherwise an information object will seem to be missing.…”
Section: Network Of Information (Netinf)mentioning
confidence: 99%
“…In order to solve these problems, researchers have focused attention on research of new Internet architecture [2]. Information-centric networks (ICN) emerges at the right moment and has received extensive research and development, among which; the respective schemes under this background include the contentcentric networking (CCN)/ named-data networking (NDN) [3], data-oriented network architecture (DONA) [4], NetInf [5], PDX [6], etc. In ICN, each node is equipped with a built-in cache, and its core idea is that storing content through internal routers of the network, then the user requests forward in the network.…”
Section: Introductionmentioning
confidence: 99%