By Topic

Discovering credentials in the content centric network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
InKwan Yu ; Inst. of Comput. Inf. & Commun., Korea Univ., Seoul, South Korea ; Bin Song ; Jiseong Son ; Doo-Kwon Baik

Many trust management systems implicitly assume that the required credentials can be obtained without difficulty. In consequence, it is necessary to have a convenient way to discover desired credentials in the network for successful deployment of trust management systems. Obviously, in distributed environments, this assumption may not be easy to achieve due to failure of different components. In this paper, based on a content centric network architecture, we show that a simple naming convention can help to provide scalability, reliability and availability in retrieving desired credentials. Especially, our scheme utilizes the routing protocol provided by the content centric network, without constructing an overlay network as in Peer-to-Peer systems.

Published in:

Information Networking (ICOIN), 2011 International Conference on

Date of Conference:

26-28 Jan. 2011