Abstract
Information is the building block of Information Centric Networks (ICNs). Access control policies limit information dissemination to authorized entities only. Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies dispersed in various network locations, including caches and content replication servers. In this paper we propose an access control enforcement delegation scheme which enables the purveyor of an information item to evaluate a request against an access control policy, without having access to the requestor credentials nor to the actual definition of the policy. Such an approach has multiple merits: it enables the interoperability of various stakeholders, it protects user identity and it can set the basis for a privacy preserving mechanism. An implementation of our scheme supports its feasibility. © 2012 ACM.
Author supplied keywords
Cite
CITATION STYLE
Fotiou, N., Marias, G. F., & Polyzos, G. C. (2012). Access control enforcement delegation for information-centric networking architectures. In ICN’12 - ACM Proceedings of the Information-Centric Networking Workshop (pp. 85–90). Association for Computing Machinery. https://doi.org/10.1145/2342488.2342507
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.