As more and more mobile data is collected continuously in space and time for a variety of purposes such as health monitoring and driving behavior tracking, people are increasingly concerned about their privacy when sharing their data. To minimize privacy leakage, data owners often want to restrict the access to their data based on space and time constraints while meeting each data user\u27s specific needs. In this paper, we introduce an access control system over Named Data Networking (NDN) that allows data owners to schematize and control data access at a fine granularity with respect to time, space, and user needs. More specifically, we designed spatio-temporal access control policies using hierarchically structured names, extended Name-b...
[[abstract]]To securely access data center supporting the constraint of temporal and location-based ...
The ongoing need for societal and industrial digital transformation requires rapidly expanding netwo...
<p>Data sharing in the cloud faces many challenges on security and privacy. Cloud computing is prefe...
Named Data Networking (NDN) is proposed as a future Internet architecture, which provides name-based...
International audience<p>Named Data Networking (NDN) represents one of the major Information Centric...
Named Data Networking (NDN) thrives in peer-to-peer data sharing scenarios, through naming data and ...
The Internet is becoming increasingly mobile. As the the price of smartphones, tablets, and other po...
International audience<p>Named Data Networking (NDN) presents one of thefirst and most emergent Info...
Named Data Networking (NDN) is a proposed Internet architecture, which changes the network communica...
In Named Data Networking (NDN), data synchronization plays an important role similar to transport pr...
In the last few years, a number of spatial and spatio-temporal access control models have been devel...
As a new Internet architecture, Named Data Networking (NDN) decouples location from the data itself ...
In an e-health environment, medical data is shared electronically between different parties. Imprope...
Ensuring homeowners\u27 privacy and security is of vital importance in smart home systems. We adopt ...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
[[abstract]]To securely access data center supporting the constraint of temporal and location-based ...
The ongoing need for societal and industrial digital transformation requires rapidly expanding netwo...
<p>Data sharing in the cloud faces many challenges on security and privacy. Cloud computing is prefe...
Named Data Networking (NDN) is proposed as a future Internet architecture, which provides name-based...
International audience<p>Named Data Networking (NDN) represents one of the major Information Centric...
Named Data Networking (NDN) thrives in peer-to-peer data sharing scenarios, through naming data and ...
The Internet is becoming increasingly mobile. As the the price of smartphones, tablets, and other po...
International audience<p>Named Data Networking (NDN) presents one of thefirst and most emergent Info...
Named Data Networking (NDN) is a proposed Internet architecture, which changes the network communica...
In Named Data Networking (NDN), data synchronization plays an important role similar to transport pr...
In the last few years, a number of spatial and spatio-temporal access control models have been devel...
As a new Internet architecture, Named Data Networking (NDN) decouples location from the data itself ...
In an e-health environment, medical data is shared electronically between different parties. Imprope...
Ensuring homeowners\u27 privacy and security is of vital importance in smart home systems. We adopt ...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access c...
[[abstract]]To securely access data center supporting the constraint of temporal and location-based ...
The ongoing need for societal and industrial digital transformation requires rapidly expanding netwo...
<p>Data sharing in the cloud faces many challenges on security and privacy. Cloud computing is prefe...