A scalable approach for managing access control in Information Centric Networks
暂无分享,去创建一个
[1] Sapna Singh,et al. A Trust Based Approach For Secure Access Control In Information Centric Network , 2012 .
[2] Satyajayant Misra,et al. Secure content delivery in information-centric networks: design, implementation, and analyses , 2013, ICN '13.
[3] Giannis F. Marias,et al. Access control enforcement delegation for information-centric networking architectures , 2012, CCRV.
[4] Dimitra I. Kaklamani,et al. On the use of Attribute‐Based Encryption for multimedia content protection over Information‐Centric Networks , 2014, Trans. Emerg. Telecommun. Technol..
[5] Daniel Massey,et al. Information-Centric Networking , 2019, Advances in Computer and Electrical Engineering.
[6] Nikos Fotiou,et al. Securing Content Sharing over ICN , 2016, ICN.
[7] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[8] Gene Tsudik,et al. Interest-Based Access Control for Content Centric Networks , 2015, ICN.
[9] Bengt Ahlgren,et al. A survey of information-centric networking , 2012, IEEE Communications Magazine.
[10] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Christopher A. Wood,et al. Flexible end-to-end content security in CCN , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[12] Nikos Fotiou,et al. A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.
[13] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[14] Sihem Guemara El Fatmi,et al. Data-based access control in named data networking , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.