WEKO3
アイテム
{"_buckets": {"deposit": "400deec1-c382-4054-8fc2-dd3d1dfd40f1"}, "_deposit": {"created_by": 18, "id": "10002", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "10002"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00010002", "sets": ["46", "352"]}, "author_link": ["56388", "39157", "56389", "56392", "56390", "56391"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2018-11-19", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "11", "bibliographicPageEnd": "81", "bibliographicPageStart": "76", "bibliographicVolumeNumber": "56", "bibliographic_titles": [{"bibliographic_title": "IEEE Communications Magazine", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "As one of the promising information-centric networking (ICN) architectures, NDN has attracted tremendous research attention and effort in the past decade. In particular, security and privacy remain significant concerns and challenges due to the fact that most of the traditional cryptographic primitives are no longer suitable for NDN architecture. For example, the traditional cryptographic primitives aim to secure point-to-point communications, always requiring explicit descriptions of to where or whom the data packets are intended, while network addressing or locating in NDN becomes implicit. To deal with such issues, the recently developed cryptographic primitives such as ABE have been applied to NDN. Also, to efficiently solve the trust-roots problem and seamlessly deploy cryptographic infrastructures, the concept of SDN has been introduced to NDN as well. This tutorial is devoted to exploring the interesting integration between NDN, ABE, and SDN.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/MCOM.2018.1701123", "subitem_link_url": "https://doi.org/10.1109/MCOM.2018.1701123"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/MCOM.2018.1701123", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "01636804", "subitem_source_identifier_type": "PISSN"}]}, "item_79_source_id_14": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA00231417", "subitem_source_identifier_type": "NCID"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "WANG, Licheng", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56388", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "ZHANG, Zonghua", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56389", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}, {"creatorNames": [{"creatorName": "WANG, Lihua", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56390", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "CAO, Zhenfu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56391", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "YANG, Yixian", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56392", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-07-09"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEECM_56_11_76_81.pdf", "filesize": [{"value": "5.5 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 5500000.0, "url": {"label": "IEEECM_56_11_76_81", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/10002/files/IEEECM_56_11_76_81.pdf"}, "version_id": "e1b7366c-06a6-4b33-92b8-53d4fac840d0"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Routing", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Computer crime", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "TCPIP", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Encryption", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Network security", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Information systems", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Securing Named Data Networking: Attribute-Based Encryption and Beyond", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Securing Named Data Networking: Attribute-Based Encryption and Beyond", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "352"], "permalink_uri": "http://hdl.handle.net/10258/00009950", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2019-07-09"}, "publish_date": "2019-07-09", "publish_status": "0", "recid": "10002", "relation": {}, "relation_version_is_last": true, "title": ["Securing Named Data Networking: Attribute-Based Encryption and Beyond"], "weko_shared_id": -1}
Securing Named Data Networking: Attribute-Based Encryption and Beyond
http://hdl.handle.net/10258/00009950
http://hdl.handle.net/10258/000099507c867be5-08cd-47ba-a02c-a52de9f2edbf
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEECM_56_11_76_81 (5.5 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2019-07-09 | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | Securing Named Data Networking: Attribute-Based Encryption and Beyond | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Routing | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Computer crime | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | TCPIP | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Encryption | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Network security | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Information systems | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
資源タイプ | journal article | |||||||||||
アクセス権 | ||||||||||||
アクセス権 | open access | |||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||
著者 |
WANG, Licheng
× WANG, Licheng× ZHANG, Zonghua× 董, 冕雄
WEKO
39157
× WANG, Lihua× CAO, Zhenfu× YANG, Yixian |
|||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||
抄録 | ||||||||||||
内容記述タイプ | Abstract | |||||||||||
内容記述 | As one of the promising information-centric networking (ICN) architectures, NDN has attracted tremendous research attention and effort in the past decade. In particular, security and privacy remain significant concerns and challenges due to the fact that most of the traditional cryptographic primitives are no longer suitable for NDN architecture. For example, the traditional cryptographic primitives aim to secure point-to-point communications, always requiring explicit descriptions of to where or whom the data packets are intended, while network addressing or locating in NDN becomes implicit. To deal with such issues, the recently developed cryptographic primitives such as ABE have been applied to NDN. Also, to efficiently solve the trust-roots problem and seamlessly deploy cryptographic infrastructures, the concept of SDN has been introduced to NDN as well. This tutorial is devoted to exploring the interesting integration between NDN, ABE, and SDN. | |||||||||||
言語 | en | |||||||||||
書誌情報 |
en : IEEE Communications Magazine 巻 56, 号 11, p. 76-81, 発行日 2018-11-19 |
|||||||||||
出版者 | ||||||||||||
言語 | en | |||||||||||
出版者 | IEEE | |||||||||||
出版者版へのリンク | ||||||||||||
10.1109/MCOM.2018.1701123 | ||||||||||||
https://doi.org/10.1109/MCOM.2018.1701123 | ||||||||||||
DOI | ||||||||||||
関連タイプ | isVersionOf | |||||||||||
識別子タイプ | DOI | |||||||||||
関連識別子 | 10.1109/MCOM.2018.1701123 | |||||||||||
日本十進分類法 | ||||||||||||
主題Scheme | NDC | |||||||||||
主題 | 007 | |||||||||||
ISSN | ||||||||||||
収録物識別子タイプ | PISSN | |||||||||||
収録物識別子 | 01636804 | |||||||||||
書誌レコードID | ||||||||||||
収録物識別子タイプ | NCID | |||||||||||
収録物識別子 | AA00231417 | |||||||||||
権利 | ||||||||||||
言語 | en | |||||||||||
権利情報 | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||
著者版フラグ | ||||||||||||
出版タイプ | AM | |||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||
フォーマット | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | application/pdf |