{"title":"提高Versec信任模式的通用性","authors":"P. Podder, A. Afanasyev","doi":"10.1145/3517212.3559487","DOIUrl":null,"url":null,"abstract":"Named Data Networking (NDN) redefines the concept of network security from securing the channel that transports data to securing the data itself by singing each Data packet at the network layer. Trust schema, which defines the relationship between a Data packet and its signer, plays a vital role in NDN security. However, to ensure the proper use of trust schema, it should be easy to define, user-friendly, and most importantly, automated. The recently proposed Versec trust schema is a promising next step for this automation and user-friendliness. Although Versec is designed for versatile security, the initial design choices are mainly targeted at a local environment. However, we want to use Versec in more generalized environments and analyze whether the current binary encoding can achieve it as it is or not. Based on our analysis, we identified several ways to make Versec more versatile.","PeriodicalId":165903,"journal":{"name":"Proceedings of the 9th ACM Conference on Information-Centric Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"On improving versatility of Versec trust schema\",\"authors\":\"P. Podder, A. Afanasyev\",\"doi\":\"10.1145/3517212.3559487\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Named Data Networking (NDN) redefines the concept of network security from securing the channel that transports data to securing the data itself by singing each Data packet at the network layer. Trust schema, which defines the relationship between a Data packet and its signer, plays a vital role in NDN security. However, to ensure the proper use of trust schema, it should be easy to define, user-friendly, and most importantly, automated. The recently proposed Versec trust schema is a promising next step for this automation and user-friendliness. Although Versec is designed for versatile security, the initial design choices are mainly targeted at a local environment. However, we want to use Versec in more generalized environments and analyze whether the current binary encoding can achieve it as it is or not. Based on our analysis, we identified several ways to make Versec more versatile.\",\"PeriodicalId\":165903,\"journal\":{\"name\":\"Proceedings of the 9th ACM Conference on Information-Centric Networking\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 9th ACM Conference on Information-Centric Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3517212.3559487\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th ACM Conference on Information-Centric Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3517212.3559487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Named Data Networking (NDN) redefines the concept of network security from securing the channel that transports data to securing the data itself by singing each Data packet at the network layer. Trust schema, which defines the relationship between a Data packet and its signer, plays a vital role in NDN security. However, to ensure the proper use of trust schema, it should be easy to define, user-friendly, and most importantly, automated. The recently proposed Versec trust schema is a promising next step for this automation and user-friendliness. Although Versec is designed for versatile security, the initial design choices are mainly targeted at a local environment. However, we want to use Versec in more generalized environments and analyze whether the current binary encoding can achieve it as it is or not. Based on our analysis, we identified several ways to make Versec more versatile.