Security, privacy, and access control in information-centric networking: A survey

R Tourani, S Misra, T Mick… - … communications surveys & …, 2017 - ieeexplore.ieee.org
Information-centric networking (ICN) replaces the widely used host-centric networking
paradigm in communication networks (eg, Internet and mobile ad hoc networks) with an …

Access control mechanisms in named data networks: A comprehensive survey

B Nour, H Khelifi, R Hussain, S Mastorakis… - Acm computing …, 2021 - dl.acm.org
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the
Future Internet Architecture (FIA) that addresses existing issues with the host-centric …

The internet of battle things

A Kott, A Swami, BJ West - Computer, 2016 - ieeexplore.ieee.org
On the battlefields of the future, multitudes of intelligent things will be communicating, acting,
and collaborating with one another and with human warfighters. This will demand major …

Flexible end-to-end content security in CCN

CA Wood, E Uzun - 2014 IEEE 11th Consumer …, 2014 - ieeexplore.ieee.org
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN),
decouples data from its source by shifting the emphasis from hosts and interfaces to …

Ordered-element naming for name-based packet forwarding

I Solis - US Patent 9,978,025, 2018 - Google Patents
A name-based content-forwarding system generates an ordered-element name for a content
item, and can process an interest to identify and perform an action that satisfies the interest …

Controlling the spread of interests and content in a content centric network

VL Jacobson, DK Smetters - US Patent 9,456,054, 2016 - Google Patents
2014/O146819 A1 5, 2014 Bae Secure Proxy Re-Encryption without Pairings. CANS. Spring
Lec 2014/O149733 A1 5, 2014 Kim ture Notes in Computer Science vol. 5339 (2008) …

Reputation-based strategy for forwarding and responding to interests over a content centric network

P Mahadevan, GC Scott - US Patent 9,729,616, 2017 - Google Patents
A CCN network node use reputation values for one or more interfaces to determine how to
forward an Interest. During operation, the network node can receive an Interest or Content …

{SIGL}: Securing software installations through deep graph learning

X Han, X Yu, T Pasquier, D Li, J Rhee… - 30th USENIX Security …, 2021 - usenix.org
Many users implicitly assume that software can only be exploited after it is installed.
However, recent supply-chain attacks demonstrate that application integrity must be ensured …

Rice: Remote method invocation in icn

M Król, K Habak, D Oran, D Kutscher… - Proceedings of the 5th …, 2018 - dl.acm.org
Information Centric Networking has been proposed as a new network layer for the Internet,
capable of encompassing the full range of networking facilities provided by the current IP …

AccConF: An access control framework for leveraging in-network cached data in the ICN-enabled wireless edge

S Misra, R Tourani, F Natividad, T Mick… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
The fast-growing Internet traffic is increasingly becoming content-based and driven by
mobile users, with users more interested in data rather than its source. This has precipitated …