Policy-based access control in content networks

WT Strayer, J Khoury, AL Caro, V Kawadia… - US Patent …, 2017 - Google Patents
Abstract Systems and techniques for policy-based access control in content networks are
herein described. Content and metadata describing the content may be encrypted by using …

Ensuring trust and confidentiality for adaptive video streaming in ICN

F Khan, H Li - Journal of Communications and Networks, 2019 - ieeexplore.ieee.org
With the dissemination of huge amount of video content over the internet, information centric
networking (ICN) has emerged as a potential candidate to effectively exploit it and improve …

Cryptographically secure cross-domain information sharing

J Khoury, WT Strayer - US Patent 9,894,043, 2018 - Google Patents
Techniques for cryptographically secure, cross-domain information sharing are described. A
first information domain including a first attribute-based encryption (ABE) authority defines a …

Content sharing with mobility in an infrastructure-less environment

T Strayer, S Nelson, A Caro, J Khoury, B Tedesco… - Computer Networks, 2018 - Elsevier
Current networking technologies are ill-suited for content sharing in emerging military and
first-responder networks where fixed infrastructures and stable connectivity cannot be …

Polymorphic waveform generation

JJ Logan, C Hansen, MB Kremer… - US Patent …, 2019 - Google Patents
Generally discussed herein are systems, devices, and methods for generating multi-function
waveforms. A device can include input circuitry to receive parameters indicating respective …

Polymorphic waveform generation

JJ Logan, C Hansen, MB Kremer… - US Patent …, 2019 - Google Patents
Generally discussed herein are systems, devices, and methods for generating multi-function
waveforms. A device can include input circuitry to receive parameters indicating respective …

Scheduling access to a shared medium

J Khoury, CP Vander Valk, MB Kremer… - US Patent …, 2019 - Google Patents
Generally discussed herein are systems, devices, and methods for scheduling node
performance of communication and/or function. A method can include receiving, from a …

Military IoT: Tactical Edge Clouds for Content Sharing Across Heterogeneous Networks

T Strayer, S Nelson, D Coffin, B Thapa… - IoT for Defense and …, 2022 - Wiley Online Library
Just as inexpensive and powerful devices are driving ecosystems of connected Internet of
Things in work and home environments, the battlefield has experienced a proliferation of …

[图书][B] FATE: A More Efficient and Flexible Approach to Data Interpretation Within Protocol Stacks

J Mathewson - 2021 - search.proquest.com
Abstract FATE (Functional Algebraic aTomic Evaluators) is introduced as an alternative to
the traditional approach of communication protocols in which each protocol implements its …

Trust policies for a data provisioning layer

WT Strayer, BD Kalashian, MH Atighetchi… - US Patent …, 2023 - Google Patents
Techniques for enforcing trust policies for payload data transmitted through a data
provisioning layer include: receiving, by a node in the data provisioning layer, payload data …