{"title":"Next generation networks: Human-aided and privacy-driven","authors":"R. Phan, Jean-Philippe Aumasson","doi":"10.1109/KINGN.2008.4542284","DOIUrl":null,"url":null,"abstract":"New generation networks (NGNs) deployed in the next fire to ten years will integrate a myriad of underlying network technologies into a common internet protocol (IP) backbone. We put forward two theses on how NGNs will evolve based on recent trends in increasing ubiquity and the need for increased security. We assert that NGNs will be increasingly human- aided and privacy-driven. We discuss how these points are inter-related, and then we culminate this paper with a model that allows formal analysis of network privacy, including the tracing of entities.","PeriodicalId":417810,"journal":{"name":"2008 First ITU-T Kaleidoscope Academic Conference - Innovations in NGN: Future Network and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First ITU-T Kaleidoscope Academic Conference - Innovations in NGN: Future Network and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KINGN.2008.4542284","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
New generation networks (NGNs) deployed in the next fire to ten years will integrate a myriad of underlying network technologies into a common internet protocol (IP) backbone. We put forward two theses on how NGNs will evolve based on recent trends in increasing ubiquity and the need for increased security. We assert that NGNs will be increasingly human- aided and privacy-driven. We discuss how these points are inter-related, and then we culminate this paper with a model that allows formal analysis of network privacy, including the tracing of entities.