Balkis Hamdane, M. Msahli, A. Serhrouchni, S. Fatmi
{"title":"命名数据网络中基于数据的访问控制","authors":"Balkis Hamdane, M. Msahli, A. Serhrouchni, S. Fatmi","doi":"10.4108/ICST.COLLABORATECOM.2013.254180","DOIUrl":null,"url":null,"abstract":"Named Data Networking (NDN) presents one of the first and most emergent Information Centric Networking (ICN) project. It offers an excellent substrate to solve today's Internet problems. To ensure security challenge, it adopts a data-centric model. The access control represents a fundamental security aspect. It prevents the data publication under any sensitive namespace and the access to any confidential content. In this paper, we use the generic and conceptual access control scheme called UCONABC to propose an optimum and secured data centric access control model. In our proposal, data is protected by encryption and lock password. Its access is managed by a centralized access list (ACL).","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Data-based access control in named data networking\",\"authors\":\"Balkis Hamdane, M. Msahli, A. Serhrouchni, S. Fatmi\",\"doi\":\"10.4108/ICST.COLLABORATECOM.2013.254180\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Named Data Networking (NDN) presents one of the first and most emergent Information Centric Networking (ICN) project. It offers an excellent substrate to solve today's Internet problems. To ensure security challenge, it adopts a data-centric model. The access control represents a fundamental security aspect. It prevents the data publication under any sensitive namespace and the access to any confidential content. In this paper, we use the generic and conceptual access control scheme called UCONABC to propose an optimum and secured data centric access control model. In our proposal, data is protected by encryption and lock password. Its access is managed by a centralized access list (ACL).\",\"PeriodicalId\":222111,\"journal\":{\"name\":\"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing\",\"volume\":\"136 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254180\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data-based access control in named data networking
Named Data Networking (NDN) presents one of the first and most emergent Information Centric Networking (ICN) project. It offers an excellent substrate to solve today's Internet problems. To ensure security challenge, it adopts a data-centric model. The access control represents a fundamental security aspect. It prevents the data publication under any sensitive namespace and the access to any confidential content. In this paper, we use the generic and conceptual access control scheme called UCONABC to propose an optimum and secured data centric access control model. In our proposal, data is protected by encryption and lock password. Its access is managed by a centralized access list (ACL).