Security, privacy, and access control in information-centric networking: A survey

R Tourani, S Misra, T Mick… - … communications surveys & …, 2017 - ieeexplore.ieee.org
Information-centric networking (ICN) replaces the widely used host-centric networking
paradigm in communication networks (eg, Internet and mobile ad hoc networks) with an …

A systematic mapping study on software quality control techniques for assessing privacy in information systems

DS Guaman, JM Del Alamo, JC Caiza - IEEE access, 2020 - ieeexplore.ieee.org
Software Quality Control (SQC) techniques are widely used throughout the software
development process with the objective of assessing and detecting anomalies that affect the …

A hybrid security scheme for inter-vehicle communication in content centric vehicular networks

R Tandon, PK Gupta - Wireless Personal Communications, 2023 - Springer
Content centric networking is one of the emerging paradigm for inter-vehicle communication
that focuses on the contents being shared within the network. In this paper, we have …

PrivICN: Privacy-preserving content retrieval in information-centric networking

C Bernardini, S Marchal, MR Asghar, B Crispo - Computer Networks, 2019 - Elsevier
Abstract Information-Centric Networking (ICN) has emerged as a paradigm to cope with the
increasing demand for content delivery on the Internet. In contrast to the Internet Protocol …

A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in content-centric networks

M Mangili, F Martignon, S Paraboschi - Computer Networks, 2015 - Elsevier
Abstract The Content-Centric Networking (CCN) paradigm introduces a novel
communication model where any node in the network can implement caching functionalities …

A comparison of system description models for data protection by design

P Dewitte, K Wuyts, L Sion, D Van Landuyt… - Proceedings of the 34th …, 2019 - dl.acm.org
Since the General Data Protection Regulation (GDPR) entered into force, every actor
involved in the processing of personal data must comply with Data Protection by Design …

Pervasive data sharing as an enabler for mobile citizen sensing systems

W Moreira, P Mendes - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Today, users can use their personal devices for a wide range of applications and services,
such as controlling other devices, monitoring human physiological signals, and accessing …

An identity privacy protection strategy in vehicle named data network

X Liu, Q Bing, X Lu, L Zhong, D Wei… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Although Vehicle Named Data Network (VNDN) possess the communication benefits of
Named Data Network and Vehicle Opportunity Network, it also introduces some new privacy …

Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends

K Tomar, S Dangi, S Sharma - Advances in Cyber Security and …, 2022 - taylorfrancis.com
The research community has been actively studying the field of edge computing for its many
advantages and potential. Information-centric networking (ICN), on the other hand, has been …

ICN privacy and name based security

N Fotiou, GC Polyzos - Proceedings of the 1st ACM Conference on …, 2014 - dl.acm.org
The purpose of this tutorial is twofold: to discuss ICN privacy requirements and related
solutions, as well as to acquaint participants with the latest advances in name-based …