1,496 research outputs found

    The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

    Full text link
    In recent years, the current Internet has experienced an unexpected paradigm shift in the usage model, which has pushed researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.Comment: 23 pages, 16 figures, 3 table

    Management of Content-Centric Networking

    Get PDF
    National audienceInformation-Centric Networks are very promising alternatives to the current Internet architecture. These new network architectures expose multiple positive features heavily studied around the globe today such as in-network caching to save resources, opportunistic routing for easy mobility and authentication of content. However, their management plane and security issues have received much less attention so far. As the Future Internet will be built on these networks, there is an urgent need for a next-generation management framework to manage ICN networks and in fact to constitute their missing management and security plane, which is essential for their success as clean-slate technologies. Indeed, these new networks need to redesign existing solutions for network monitoring, security, configuration, interoperability or accountability. This tutorial aims at surveying the key challenges in management and monitoring of ICN networks. We will more precisely focus on the Content-Centric Networking architecture and describe a recent advance in this field which is a proposal of CCN firewall

    10492 Abstracts Collection -- Information-Centric Networking

    Get PDF
    From December 5th to 8th 2010, the Dagstuhl Seminar 10492 on "Information-Centric Networking" was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Foreword and editorial - May issue

    Full text link

    IaaS-cloud security enhancement: an intelligent attribute-based access control model and implementation

    Get PDF
    The cloud computing paradigm introduces an efficient utilisation of huge computing resources by multiple users with minimal expense and deployment effort compared to traditional computing facilities. Although cloud computing has incredible benefits, some governments and enterprises remain hesitant to transfer their computing technology to the cloud as a consequence of the associated security challenges. Security is, therefore, a significant factor in cloud computing adoption. Cloud services consist of three layers: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing services are accessed through network connections and utilised by multi-users who can share the resources through virtualisation technology. Accordingly, an efficient access control system is crucial to prevent unauthorised access. This thesis mainly investigates the IaaS security enhancement from an access control point of view. [Continues.

    SEMAG: A Novel Semantic-Agent Learning Recommendation Mechanism for Enhancing Learner-System Interaction

    Get PDF
    In this paper, we present SEMAG - a novel semantic-agent learning recommendation mechanism which utilizes the advantages of instructional Semantic Web rules and multi-agent technology, in order to build a competitive and interactive learning environment. Specifically, the recommendation-making process is contingent upon chapter-quiz results, as usual; but it also checks the students' understanding at topic-levels, through personalized questions generated instantly and dynamically by a knowledge-based algorithm. The learning space is spread to the social network, with the aim of increasing the interaction between students and the intelligent tutoring system. A field experiment was conducted in which the results indicated that the experimental group gained significant achievements, and thus it supports the use of SEMAG

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Get PDF
    Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became impractical for entities to have prior offline (real world) trust. The evolution of digital trust took diverse approaches and now trust is defined and understood differently across heterogeneous domains. This paper looks at digital trust from the point of view of security and examines how valid trust approaches from other domains are now making their way into secure computing. The paper also revisits and analyses the Trusted Platform Module (TPM) along with associated technologies and their relevance in the changing landscape. We especially focus on the domains of cloud computing, mobile computing and cyber-physical systems. In addition, the paper also explores our proposals that are competing with and extending the traditional functionality of TPM specifications
    corecore