Access control enforcement delegation for information-centric networking architectures

46Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information is the building block of Information Centric Networks (ICNs). Access control policies limit information dissemination to authorized entities only. Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies dispersed in various network locations, including caches and content replication servers. In this paper we propose an access control enforcement delegation scheme which enables the purveyor of an information item to evaluate a request against an access control policy, without having access to the requestor credentials nor to the actual definition of the policy. Such an approach has multiple merits: it enables the interoperability of various stakeholders, it protects user identity and it can set the basis for a privacy preserving mechanism. An implementation of our scheme supports its feasibility. © 2012 ACM.

Cite

CITATION STYLE

APA

Fotiou, N., Marias, G. F., & Polyzos, G. C. (2012). Access control enforcement delegation for information-centric networking architectures. In ICN’12 - ACM Proceedings of the Information-Centric Networking Workshop (pp. 85–90). Association for Computing Machinery. https://doi.org/10.1145/2342488.2342507

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free