Access control mechanisms in named data networks: A comprehensive survey

B Nour, H Khelifi, R Hussain, S Mastorakis… - Acm computing …, 2021 - dl.acm.org
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the
Future Internet Architecture (FIA) that addresses existing issues with the host-centric …

SPICE-IT: Smart COVID-19 pandemic controlled eradication over NDN-IoT

MTR Khan, MM Saad, MA Tariq, J Akram, D Kim - Information Fusion, 2021 - Elsevier
Internet of things (IoT) application in e-health can play a vital role in countering rapidly
spreading diseases that can effectively manage health emergency scenarios like …

CBSOACH: design of an efficient consortium blockchain-based selective ownership and access control model with vulnerability resistance using hybrid decision …

KN Pampattiwar, PV Chavan - International Journal of …, 2023 - inderscienceonline.com
Cloud deployments are prone to vulnerabilities and attacks, mitigated via security patches.
However, these patches increase the computational complexity of the deployments, thus …

Access control supported by information service entity in named data networking

B Li, M Ma, Y Zhang, F Lai - 2022 5th International Conference …, 2022 - ieeexplore.ieee.org
Named Data Networking (NDN) has been viewed as a promising future Internet architecture.
It requires a new access control scheme to prevent the injection of unauthorized data …

一种信息中心移动自组网中的数据访问控制机制

刘宁春, 郜帅, 侯心迪, 国兴昌 - 北京邮电大学学报, 2021 - journal.bupt.edu.cn
针对信息中心移动自组网场景中节点间间歇连接和网内泛在缓存的特点, 提出一种基于门限秘密
共享机制的数据访问控制机制. 通过构建辅助密钥块, 降低了消费者解密的开销和网络节点的 …

Consortium-Based Algorithm for Access Control and Pattern Analysis Models

NV Pardakhe, VM Deshmukh - 2023 - researchsquare.com
Inappropriate ownership transfers, weak access control, and incorrect authentication are just
some of the most common external risks to public cloud installations. Cloud application …