{"created":"2023-06-19T10:29:55.236074+00:00","id":10002,"links":{},"metadata":{"_buckets":{"deposit":"400deec1-c382-4054-8fc2-dd3d1dfd40f1"},"_deposit":{"created_by":18,"id":"10002","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"10002"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00010002","sets":["216:352","46"]},"author_link":["56388","39157","56389","56392","56390","56391"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-11-19","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicPageEnd":"81","bibliographicPageStart":"76","bibliographicVolumeNumber":"56","bibliographic_titles":[{"bibliographic_title":"IEEE Communications Magazine","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"As one of the promising information-centric networking (ICN) architectures, NDN has attracted tremendous research attention and effort in the past decade. In particular, security and privacy remain significant concerns and challenges due to the fact that most of the traditional cryptographic primitives are no longer suitable for NDN architecture. For example, the traditional cryptographic primitives aim to secure point-to-point communications, always requiring explicit descriptions of to where or whom the data packets are intended, while network addressing or locating in NDN becomes implicit. To deal with such issues, the recently developed cryptographic primitives such as ABE have been applied to NDN. Also, to efficiently solve the trust-roots problem and seamlessly deploy cryptographic infrastructures, the concept of SDN has been introduced to NDN as well. This tutorial is devoted to exploring the interesting integration between NDN, ABE, and SDN.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/MCOM.2018.1701123","subitem_link_url":"https://doi.org/10.1109/MCOM.2018.1701123"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]},"item_79_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/MCOM.2018.1701123","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"01636804","subitem_source_identifier_type":"PISSN"}]},"item_79_source_id_14":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00231417","subitem_source_identifier_type":"NCID"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"WANG, Licheng","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"ZHANG, Zonghua","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"WANG, Lihua","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"CAO, Zhenfu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"YANG, Yixian","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-07-09"}],"displaytype":"detail","filename":"IEEECM_56_11_76_81.pdf","filesize":[{"value":"5.5 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEEECM_56_11_76_81","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/10002/files/IEEECM_56_11_76_81.pdf"},"version_id":"e1b7366c-06a6-4b33-92b8-53d4fac840d0"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Routing","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Computer crime","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"TCPIP","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Encryption","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Network security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Information systems","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Securing Named Data Networking: Attribute-Based Encryption and Beyond","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Securing Named Data Networking: Attribute-Based Encryption and Beyond","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-07-09"},"publish_date":"2019-07-09","publish_status":"0","recid":"10002","relation_version_is_last":true,"title":["Securing Named Data Networking: Attribute-Based Encryption and Beyond"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2023-10-24T01:52:38.631454+00:00"}