Proceedings of the 6th ACM Workshop on Digital Identity Management 2010
DOI: 10.1145/1866855.1866866
|View full text |Cite
|
Sign up to set email alerts
|

Identity based architecture for secure communication in future internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…faces a series of important technical challenges, one of them being the management of diverse user and object identities [5]. 'The separation of identity and locator is one such innovative trend, although the architectural problem of supporting the real people behind the physical device while at the same time protecting information about the user and its context has no solution yet' [6].…”
Section: Identity Management (Idm)mentioning
confidence: 99%
“…faces a series of important technical challenges, one of them being the management of diverse user and object identities [5]. 'The separation of identity and locator is one such innovative trend, although the architectural problem of supporting the real people behind the physical device while at the same time protecting information about the user and its context has no solution yet' [6].…”
Section: Identity Management (Idm)mentioning
confidence: 99%
“…Therefore, although some performance improvements are certainly possible to be applied to the communication of the DTEs, as we show in [11], in this paper we have not focused on this aspect but on the secure identityto-identity communication and the mobility support of our architecture applied as an id/loc mapping system. Finally, the client nodes are defined to make a simple communication.…”
Section: Proof-of-concept Implementationmentioning
confidence: 99%
“…Therefore, in this paper, we explore an alternative architecture by joining the functionality of the HNR and IDR in one infrastructure and connecting them to form a flat overlay network, such as the network found in Chord [9]. For this purpose, we adapt the Copyright c 2012 The Institute of Electronics, Information and Communication Engineers Domain Trusted Entity (DTE) infrastructure, an architecture that incorporates a distributed trusted framework to achieve secure identity-based communications [10], [11]. The application of DTE to the joint IDR/HNR infrastructure provides many new features, like enhanced security and robustness, without performance penalty.…”
Section: Introductionmentioning
confidence: 99%
“…We propose a different approach to the Internet based on previous work [16][17][18][19]. If we go back to how we started this discourse, the Internet is for people to communicate.…”
Section: Proposed Architecturementioning
confidence: 99%