{"title":"信息网络中的私有域","authors":"R. Rembarz, D. Catrein, J. Sachs","doi":"10.1109/ICCW.2009.5207981","DOIUrl":null,"url":null,"abstract":"The networking research community has recently started looking into so-called information-centric networks, which regard information objects as the primary elements in the network. Users store and retrieve the information objects, denoted by object identifi- ers, from the network without knowing or bothering which host serves the actual request, comparable to earlier initiatives in networking that separate node identifiers from network locations. The capability to address content directly takes many optimizations, such as content- optimized routing or transparent caching, to the next level, while at the same time enabling novel services. In order to prevent unautho- rized access to the information objects that roam around freely in the global network, objects shall be encrypted. We argue that for some use cases, e.g. when dealing with sensitive company-internal information, a stricter partitioning of the network is required. We propose and discuss two solutions to this problem, one focusing on securing the name resolution procedure, the other concentrating on the actual re- trieval. Both mechanisms complement existing proposals by separating information objects in the private network domain while maintaining global reachability.","PeriodicalId":271067,"journal":{"name":"2009 IEEE International Conference on Communications Workshops","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Private Domains in Networks of Information\",\"authors\":\"R. Rembarz, D. Catrein, J. Sachs\",\"doi\":\"10.1109/ICCW.2009.5207981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The networking research community has recently started looking into so-called information-centric networks, which regard information objects as the primary elements in the network. Users store and retrieve the information objects, denoted by object identifi- ers, from the network without knowing or bothering which host serves the actual request, comparable to earlier initiatives in networking that separate node identifiers from network locations. The capability to address content directly takes many optimizations, such as content- optimized routing or transparent caching, to the next level, while at the same time enabling novel services. In order to prevent unautho- rized access to the information objects that roam around freely in the global network, objects shall be encrypted. We argue that for some use cases, e.g. when dealing with sensitive company-internal information, a stricter partitioning of the network is required. We propose and discuss two solutions to this problem, one focusing on securing the name resolution procedure, the other concentrating on the actual re- trieval. Both mechanisms complement existing proposals by separating information objects in the private network domain while maintaining global reachability.\",\"PeriodicalId\":271067,\"journal\":{\"name\":\"2009 IEEE International Conference on Communications Workshops\",\"volume\":\"90 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Communications Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCW.2009.5207981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Communications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2009.5207981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The networking research community has recently started looking into so-called information-centric networks, which regard information objects as the primary elements in the network. Users store and retrieve the information objects, denoted by object identifi- ers, from the network without knowing or bothering which host serves the actual request, comparable to earlier initiatives in networking that separate node identifiers from network locations. The capability to address content directly takes many optimizations, such as content- optimized routing or transparent caching, to the next level, while at the same time enabling novel services. In order to prevent unautho- rized access to the information objects that roam around freely in the global network, objects shall be encrypted. We argue that for some use cases, e.g. when dealing with sensitive company-internal information, a stricter partitioning of the network is required. We propose and discuss two solutions to this problem, one focusing on securing the name resolution procedure, the other concentrating on the actual re- trieval. Both mechanisms complement existing proposals by separating information objects in the private network domain while maintaining global reachability.