loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mahdi Aiash and Jonathan Loo

Affiliation: Middlesex University, United Kingdom

Keyword(s): Information-centric Network, Network of Information, Capability-based Access Control, Casper/FDR.

Related Ontology Subjects/Areas/Topics: Access Control ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Network Security ; Security in Distributed Systems ; Web Information Systems and Technologies ; Wireless Network Security

Abstract: Communications in Information-Centric Networking place more attention on WHAT data are being exchanged rather than WHO are exchanging them. A well-established approach of information centric networks is the Network of Information (NetInf) architecture, developed as part of the EU FP7 project SAIL. The security of NetInf has been fairly analysed in the literature. In particular, research efforts have been focusing on achieving data integrity and confidentially, source or publisher authenticity and authorization. This paper analyses some work in the literature to enforce authorized access to data in NetInf, highlights a potential security threat and proposes an enhancement to address the discovered threat. The new enhancement has been formally verified using formal method approach based on the Casper/FDR tool.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.144.43.194

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Aiash, M. and Loo, J. (2015). A Formally Verified Access Control Mechanism for Information Centric Networks. In Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015) - SECRYPT; ISBN 978-989-758-117-5; ISSN 2184-3236, SciTePress, pages 377-383. DOI: 10.5220/0005566303770383

@conference{secrypt15,
author={Mahdi Aiash. and Jonathan Loo.},
title={A Formally Verified Access Control Mechanism for Information Centric Networks},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015) - SECRYPT},
year={2015},
pages={377-383},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005566303770383},
isbn={978-989-758-117-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015) - SECRYPT
TI - A Formally Verified Access Control Mechanism for Information Centric Networks
SN - 978-989-758-117-5
IS - 2184-3236
AU - Aiash, M.
AU - Loo, J.
PY - 2015
SP - 377
EP - 383
DO - 10.5220/0005566303770383
PB - SciTePress