MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) 2018
DOI: 10.1109/milcom.2018.8599774
|View full text |Cite
|
Sign up to set email alerts
|

NAC: Automating Access Control via Named Data

Abstract: In this paper we present the design of Name-based Access Control (NAC) scheme, which supports data confidentiality and access control in Named Data Networking (NDN) architecture by encrypting content at the time of production, and by automating the distribution of encryption and decryption keys. NAC achieves the above design goals by leveraging specially crafted NDN naming conventions to define and enforce access control policies, and to automate the cryptographic key management. The paper also explains how ND… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 48 publications
(16 citation statements)
references
References 19 publications
0
15
0
1
Order By: Relevance
“…By encrypting the content with specific key, only the user owning the key can consume the content. Concretely, Zhang et al 3 proposed a typical access control scheme named NAC‐RSA. In NAC‐RSA, three roles are introduced, Access Manager (AM), Encryptor (i.e., the producer in NDN), Decryptor (i.e., the consumer in NDN).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…By encrypting the content with specific key, only the user owning the key can consume the content. Concretely, Zhang et al 3 proposed a typical access control scheme named NAC‐RSA. In NAC‐RSA, three roles are introduced, Access Manager (AM), Encryptor (i.e., the producer in NDN), Decryptor (i.e., the consumer in NDN).…”
Section: Related Workmentioning
confidence: 99%
“…To protect individual privacy in security‐based mobile prediction process for opportunistic Cloud of Things, Wang et al 8 designed a Privacy‐Preserving Message Forwarding framework, which also integrates an attribute‐based cryptographic algorithm with a message delivery process to resist malicious attack. Through improving NAC‐RSA using CP‐ABE, Zhang et, al 3 . proposed NAC‐ABE and simplified the key management and achieved better scalability under fine‐grained access control.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, the access control module in Sovereign is also based on names. In Sovereign, the payload carried by each network packet is encrypted in a data-centric way [44]: the ciphertext is not bound with a channel (e.g., TLS); any party who has the decryption key can access it.…”
Section: Access Controlmentioning
confidence: 99%
“…We argue that this is relatively easy in a private business model where the trust relationships among system entities have already been established. For example, DLedger can utilize name-based access control (NAC) [34], where the identity manager can serve as the decryption key distributor who grants the access rights to internal entities only.…”
Section: Security Attributesmentioning
confidence: 99%