Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking 2012
DOI: 10.1145/2342488.2342507
|View full text |Cite
|
Sign up to set email alerts
|

Access control enforcement delegation for information-centric networking architectures

Abstract: Information is the building block of Information Centric Networks (ICNs). Access control policies limit information dissemination to authorized entities only. Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies dispersed in various network locations, including caches and content replication servers. In this paper we propose an access control enforcement delegation scheme which enables the purveyor of an information item to evaluate a request agai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 56 publications
(40 citation statements)
references
References 12 publications
0
38
0
2
Order By: Relevance
“…This also creates significant challenges when attempting to manage and restrict key access. An authorization delegation scheme has been proposed [Fotiou12]. This scheme allows semi-trusted entities (such as caches or CDN nodes) to delegate access control decisions to third-party access control providers that are trusted by the content publisher.…”
Section: Authorization Access Control and Loggingmentioning
confidence: 99%
“…This also creates significant challenges when attempting to manage and restrict key access. An authorization delegation scheme has been proposed [Fotiou12]. This scheme allows semi-trusted entities (such as caches or CDN nodes) to delegate access control decisions to third-party access control providers that are trusted by the content publisher.…”
Section: Authorization Access Control and Loggingmentioning
confidence: 99%
“…al. [2] propose a delegation-based access control architecture for ICN. However, the solution relies on state maintenance and synchronization between content routers and access control policy servers, therefore scalability becomes a major issue for large-scale content networks.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, content caching and access control are performed in application-level services, such as encryption-based access control or delegation-based services [2]. We seek to address efficient integrity verification and content access (including caching) control with a single solution in the network layer, by leveraging the existing security mechanism in NDN with a minimal extension.…”
mentioning
confidence: 99%
“…Therefore, existing privacy-preserving solutions are not being able to be adopted directly by mobile social networks. Actually, the information sharing among different people for mobile social networking is commonly under the honest-but-curious model [3], that is parties involved are honest (e.g. would not inject false values into their data) but at most curious about other"s data.…”
Section: Motivation Applicationsmentioning
confidence: 99%