Policy-based access control in content networks

WT Strayer, J Khoury, AL Caro, V Kawadia… - US Patent …, 2017 - Google Patents
Abstract Systems and techniques for policy-based access control in content networks are
herein described. Content and metadata describing the content may be encrypted by using …

[PDF][PDF] Military Ontologies for Information Dissemination at the Tactical Edge.

E Leblanc, DN Nguyen, M Balduccini, WC Regli… - JOWO@ IJCAI, 2015 - asklab.net
In this paper we present our methodology for constructing the Tactical Heterogenous
Ontology Representation (THOR), a doctrine-based military ontology that models numerous …

An efficient and expressive access control architecture for content-based networks

J Khoury, S Nelson, A Caro, V Kawadia… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Tactical content-based networks provide high military utility in dynamic mobile networks with
intermittent connectivity and inherent disruption. Protecting the confidentiality of information …

CIDOR: Content distribution and retrieval in disaster networks for public protection

HMA Islam, D Lagutin, A Lukyanenko… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric
communication model for Future Internet architectures. It supports the retrieval of a particular …

Content sharing with mobility in an infrastructure-less environment

T Strayer, S Nelson, A Caro, J Khoury, B Tedesco… - Computer Networks, 2018 - Elsevier
Current networking technologies are ill-suited for content sharing in emerging military and
first-responder networks where fixed infrastructures and stable connectivity cannot be …

Clan: An efficient distributed temporal community detection protocol for manets

S Dabideen, V Kawadia… - 2014 IEEE 11th …, 2014 - ieeexplore.ieee.org
Real world MANETs often exhibit an inherent community structure in their topological
connectivity and in the evolution of the topology over time. Such temporal community …

Content-oriented mobile edge technology system integration framework and field evaluation

Z Cao, M French, R Krishnan, J Ng… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
In recent years, content-oriented networking has garnered extensive interest from both
academia and industry as a potential direction for future Internet evolution. It is also a …

Military IoT: Tactical Edge Clouds for Content Sharing Across Heterogeneous Networks

T Strayer, S Nelson, D Coffin, B Thapa… - IoT for Defense and …, 2022 - Wiley Online Library
Just as inexpensive and powerful devices are driving ecosystems of connected Internet of
Things in work and home environments, the battlefield has experienced a proliferation of …

Trust policies for a data provisioning layer

WT Strayer, BD Kalashian, MH Atighetchi… - US Patent …, 2023 - Google Patents
Techniques for enforcing trust policies for payload data transmitted through a data
provisioning layer include: receiving, by a node in the data provisioning layer, payload data …

Metadata-based information provenance

MH Atighetchi, SY Blais, SC Nelson - US Patent 11,233,707, 2022 - Google Patents
Techniques for metadata-based information provenance are disclosed. A node in a data
provisioning layer receives encrypted payload data to be delivered to a recipient. The node …