Browse > Article
http://dx.doi.org/10.3745/JIPS.2010.6.3.359

Access Control to Objects and their Description in the Future Network of Information  

Renault, Eric (Dept. of Wireless Networks and Multimedia Services, Institut Telecom)
Ahmad, Ahmad (Dept. of Wireless Networks and Multimedia Services, Institut Telecom)
Abid, Mohamed (Dept. of Wireless Networks and Multimedia Services, Institut Telecom)
Publication Information
Journal of Information Processing Systems / v.6, no.3, 2010 , pp. 359-374 More about this Journal
Abstract
The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a nodecentric organization to an information-centric network allowing new a paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. In this paper, we propose a security solution for a model of information based on a semantic description and search of objects. The proposed solution takes into account both the access and the management of both objects and their descriptions.
Keywords
Future Internet; Network of Information; Security; Storage Space; Access Rights;
Citations & Related Records
연도 인용수 순위
  • Reference
1 X800 CCITT Recommandation: Data Communication Networks: Open Interconnection(OSI); Security, Structure and Architecture for Open SystemsInterconnection for CCITT. 1992.
2 B. Ohlman et al. First NetInf Architecture Description. FP7 4WARD Deliverable 6.1. February, 2009.
3 E. Renault and D. Zeghlache. The Metalist Model: a Simple and Extensible Information Model for the Future Internet. EUNICE 2009-The Internet of the Future, September, 2009, Barcelona, Spain.
4 BitTorrent. http://www.bittorrent.com/
5 Exchangeable Image File Format for Digital Still Cameras: Exif Version 2.2. Standard of Japan Electronics and Information Technology Industries Association, April, 2002.
6 L. Blunk and J. Vollbrecht. PPP Extensible Authentication Protocol (EAP). RFC 2284, March, 1998.
7 X9.62-1998 (draft). Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). 1998.
8 E. Barker, D. Johnson and M. Smid. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. NIST Special Publication 800-56A, March, 2007.
9 T. Kivinen and M. Kojo. More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key exchange (IKE). RFC 3526, May, 2003.
10 N. McCullagh and P.S.L.M. Barreto. A new two-party identity-based authenticated key agreement. In Cryptographers Track at RSA Conference, 2005.
11 A.G. Myasnikov. Theory of models of bilinear mappings. Omsk City. Translated from sibirskii Matematicheskii Zhurnal, 31(3):94-108, 1990.
12 G. Frey and H.-G. Ruck. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comp, 62(206):865-874, 1994.
13 S. Rao. Copyright: its implications for electronic information. Online information review, 27(4):264-275, 2003.   DOI   ScienceOn
14 C. Dannewitz, K. Pentikousis, R. Rembarz, E. Renault, O. Strandberg and J. Ubillos. Scenarios and Research Issues for a Network of Information. MobiMedia'08, July 7-9, 2008, Oulu, Finland.
15 The FP7 4WARD Project. http://www.4ward-project.eu/
16 D. Crockford. The application/json Media Type for JavaScript Object Notation (JSON). RFC 4627, Network Working Group, July, 2006.
17 N. Niebert, S. Baucke, I. El-Khayat, M. Johnsson, B. Ohlman, H. Abramowicz, K. Wuenstel, H. Woesner, J. Quittek and L.M. Correia. The way 4WARD to the creation of a future internet. PIMRC, 2008.
18 J. Day. Patterns in Network Architecture: a Return to Fundamentals. Upper Saddle River, NJ, USA, 2008.
19 R. Jain. Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation. Military Communications Conference MILCOM, October 23-25, 2006, Washington DC.
20 D.D. Clark, J. Wroclawski, K.R. Sollins and R. Braden. Tussle in Cyberspace: Defining Tomorrow's Internet. SIGCOMM'02, August 19-23, 2002, Pittsburgh, Pennsylvania, USA.
21 C. Wang, A. Carzaniga, D. Evans and A.L. Wolf. Security issues and requirements for Internetscale publish-subscribe systems. Proceedings of the 35th Hawaii International Conference on System Sciences, 2002.
22 Z. Miklos. Towards an access control mechanism for wide-area publish/subscribe systems. Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW'02), 2002.