1,496 research outputs found
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
In recent years, the current Internet has experienced an unexpected paradigm
shift in the usage model, which has pushed researchers towards the design of
the Information-Centric Networking (ICN) paradigm as a possible replacement of
the existing architecture. Even though both Academia and Industry have
investigated the feasibility and effectiveness of ICN, achieving the complete
replacement of the Internet Protocol (IP) is a challenging task.
Some research groups have already addressed the coexistence by designing
their own architectures, but none of those is the final solution to move
towards the future Internet considering the unaltered state of the networking.
To design such architecture, the research community needs now a comprehensive
overview of the existing solutions that have so far addressed the coexistence.
The purpose of this paper is to reach this goal by providing the first
comprehensive survey and classification of the coexistence architectures
according to their features (i.e., deployment approach, deployment scenarios,
addressed coexistence requirements and architecture or technology used) and
evaluation parameters (i.e., challenges emerging during the deployment and the
runtime behaviour of an architecture). We believe that this paper will finally
fill the gap required for moving towards the design of the final coexistence
architecture.Comment: 23 pages, 16 figures, 3 table
Management of Content-Centric Networking
National audienceInformation-Centric Networks are very promising alternatives to the current Internet architecture. These new network architectures expose multiple positive features heavily studied around the globe today such as in-network caching to save resources, opportunistic routing for easy mobility and authentication of content. However, their management plane and security issues have received much less attention so far. As the Future Internet will be built on these networks, there is an urgent need for a next-generation management framework to manage ICN networks and in fact to constitute their missing management and security plane, which is essential for their success as clean-slate technologies. Indeed, these new networks need to redesign existing solutions for network monitoring, security, configuration, interoperability or accountability. This tutorial aims at surveying the key challenges in management and monitoring of ICN networks. We will more precisely focus on the Content-Centric Networking architecture and describe a recent advance in this field which is a proposal of CCN firewall
10492 Abstracts Collection -- Information-Centric Networking
From December 5th to 8th 2010, the Dagstuhl Seminar 10492 on "Information-Centric Networking" was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put
together in this paper. The first section describes the seminar topics and
goals in general. Links to extended abstracts or full papers are provided,
if available
IaaS-cloud security enhancement: an intelligent attribute-based access control model and implementation
The cloud computing paradigm introduces an efficient utilisation of huge computing
resources by multiple users with minimal expense and deployment effort
compared to traditional computing facilities. Although cloud computing has incredible
benefits, some governments and enterprises remain hesitant to transfer
their computing technology to the cloud as a consequence of the associated security
challenges. Security is, therefore, a significant factor in cloud computing
adoption. Cloud services consist of three layers: Software as a Service (SaaS), Platform
as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing
services are accessed through network connections and utilised by multi-users who
can share the resources through virtualisation technology. Accordingly, an efficient
access control system is crucial to prevent unauthorised access.
This thesis mainly investigates the IaaS security enhancement from an access
control point of view. [Continues.
SEMAG: A Novel Semantic-Agent Learning Recommendation Mechanism for Enhancing Learner-System Interaction
In this paper, we present SEMAG - a novel semantic-agent learning recommendation mechanism which utilizes the advantages of instructional Semantic Web rules and multi-agent technology, in order to build a competitive and interactive learning environment. Specifically, the recommendation-making process is contingent upon chapter-quiz results, as usual; but it also checks the students' understanding at topic-levels, through personalized questions generated instantly and dynamically by a knowledge-based algorithm. The learning space is spread to the social network, with the aim of increasing the interaction between students and the intelligent tutoring system. A field experiment was conducted in which the results indicated that the experimental group gained significant achievements, and thus it supports the use of SEMAG
Digital Trust - Trusted Computing and Beyond A Position Paper
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became impractical for entities to have prior offline (real world) trust. The evolution of digital trust took diverse approaches and now trust is defined and understood differently across heterogeneous domains. This paper looks at digital trust from the point of view of security and examines how valid trust approaches from other domains are now making their way into secure computing. The paper also revisits and analyses the Trusted Platform Module (TPM) along with associated technologies and their relevance in the changing landscape. We especially focus on the domains of cloud computing, mobile computing and cyber-physical systems. In addition, the paper also explores our proposals that are competing with and extending the traditional functionality of TPM specifications
- …