2012
DOI: 10.11591/ijins.v1i2.467
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Based Approach For Secure Access Control In Information Centric Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 4 publications
0
8
0
2
Order By: Relevance
“…Although we believe that the latter approach is more acceptable, as it imposes less complexity, efficient access revocation is a key design factor for scalable AC in ICNs. Some of the proposed mechanisms [114], [119], [120], [124], [127], [130], [131], [133] require the network (routers) to enforce AC and authenticate clients. The fact that the intermediate routers have to perform authentication procedure undermines the scalability of these mechanisms.…”
Section: Summary and Future Directions In Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Although we believe that the latter approach is more acceptable, as it imposes less complexity, efficient access revocation is a key design factor for scalable AC in ICNs. Some of the proposed mechanisms [114], [119], [120], [124], [127], [130], [131], [133] require the network (routers) to enforce AC and authenticate clients. The fact that the intermediate routers have to perform authentication procedure undermines the scalability of these mechanisms.…”
Section: Summary and Future Directions In Access Controlmentioning
confidence: 99%
“…Singh [131] proposed a trust-based approach for AC in pub/sub networks. In this scheme, a client has to establish trust with a broker, an intermediate entity that authenticates clients and publishers.…”
mentioning
confidence: 99%
“…Most of the schemes introduced in the literature for caching aim to reduce the RTT and improve users experience by maximizing the cache hit and minimizing cache misses. Examples of the prior literature on caching in ICN to address these issues include the work in [12], [13], [26], [34], [37], [41], [43].…”
Section: Related Workmentioning
confidence: 99%
“…Sapna singh et al (2010) [20] proposed trust based access control model, the privilege for defining the access levels are given to the publisher where certain constraints will be defined on each information object being published by the publisher in order to establish a desired trust level for the subscriber to get access to the information of his interest.…”
Section: Study Of Existing Trust Based Access Modelsmentioning
confidence: 99%