Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Privacy in Content-Oriented Networking: Threats and Countermeasures

Identifieur interne : 000843 ( PascalFrancis/Corpus ); précédent : 000842; suivant : 000844

Privacy in Content-Oriented Networking: Threats and Countermeasures

Auteurs : Abdelberi Chaabane ; Emiliano De Cristofaro ; MOHAMED ALI KAAFAR ; Ersin Uzun

Source :

RBID : Pascal:13-0295001

Descripteurs français

English descriptors

Abstract

As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0146-4833
A03   1    @0 Comput. commun. rev.
A05       @2 43
A06       @2 3
A08 01  1  ENG  @1 Privacy in Content-Oriented Networking: Threats and Countermeasures
A11 01  1    @1 CHAABANE (Abdelberi)
A11 02  1    @1 DE CRISTOFARO (Emiliano)
A11 03  1    @1 MOHAMED ALI KAAFAR
A11 04  1    @1 UZUN (Ersin)
A14 01      @1 INRIA Rhone-Alpes @3 FRA @Z 1 aut. @Z 3 aut.
A14 02      @1 PARC @2 Palo Alto, CA @3 USA @Z 2 aut. @Z 4 aut.
A14 03      @1 NICTA @3 AUS @Z 3 aut.
A20       @1 26-33
A21       @1 2013
A23 01      @0 ENG
A43 01      @1 INIST @2 28172 @5 354000503896500030
A44       @0 0000 @1 © 2013 INIST-CNRS. All rights reserved.
A45       @0 54 ref.
A47 01  1    @0 13-0295001
A60       @1 P
A61       @0 A
A64 01  1    @0 Computer communication review
A66 01      @0 USA
C01 01    ENG  @0 As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.
C02 01  X    @0 001D02B04
C02 02  X    @0 001D02B07C
C03 01  X  FRE  @0 Vie privée @5 06
C03 01  X  ENG  @0 Private life @5 06
C03 01  X  SPA  @0 Vida privada @5 06
C03 02  X  FRE  @0 Internet @5 07
C03 02  X  ENG  @0 Internet @5 07
C03 02  X  SPA  @0 Internet @5 07
C03 03  X  FRE  @0 Extensibilité @5 08
C03 03  X  ENG  @0 Scalability @5 08
C03 03  X  SPA  @0 Estensibilidad @5 08
C03 04  X  FRE  @0 Mobilité @5 09
C03 04  X  ENG  @0 Mobility @5 09
C03 04  X  SPA  @0 Movilidad @5 09
C03 05  X  FRE  @0 Sécurité informatique @5 10
C03 05  X  ENG  @0 Computer security @5 10
C03 05  X  SPA  @0 Seguridad informatica @5 10
C03 06  X  FRE  @0 Antémémoire @5 11
C03 06  X  ENG  @0 Cache memory @5 11
C03 06  X  SPA  @0 Antememoria @5 11
C03 07  X  FRE  @0 Gestion mémoire @5 12
C03 07  X  ENG  @0 Storage management @5 12
C03 07  X  SPA  @0 Gestión memoria @5 12
C03 08  X  FRE  @0 Confidentialité @5 18
C03 08  X  ENG  @0 Confidentiality @5 18
C03 08  X  SPA  @0 Confidencialidad @5 18
C03 09  X  FRE  @0 Architecture réseau @5 19
C03 09  X  ENG  @0 Network architecture @5 19
C03 09  X  SPA  @0 Arquitectura red @5 19
C03 10  X  FRE  @0 Dénomination @5 20
C03 10  X  ENG  @0 Naming @5 20
C03 10  X  SPA  @0 Denominación @5 20
C03 11  X  FRE  @0 Analyse risque @5 21
C03 11  X  ENG  @0 Risk analysis @5 21
C03 11  X  SPA  @0 Análisis riesgo @5 21
C03 12  X  FRE  @0 Anonymat @5 22
C03 12  X  ENG  @0 Anonymity @5 22
C03 12  X  SPA  @0 Anonimato @5 22
C03 13  X  FRE  @0 Niveau @5 23
C03 13  X  ENG  @0 Level @5 23
C03 13  X  SPA  @0 Nivel @5 23
C03 14  X  FRE  @0 Censure @5 24
C03 14  X  ENG  @0 Censorship @5 24
C03 14  X  SPA  @0 Censura @5 24
C03 15  X  FRE  @0 Traçabilité @5 25
C03 15  X  ENG  @0 Traceability @5 25
C03 15  X  SPA  @0 Rastreabilidad @5 25
C03 16  X  FRE  @0 . @4 INC @5 82
N21       @1 280
N44 01      @1 OTO
N82       @1 OTO

Format Inist (serveur)

NO : PASCAL 13-0295001 INIST
ET : Privacy in Content-Oriented Networking: Threats and Countermeasures
AU : CHAABANE (Abdelberi); DE CRISTOFARO (Emiliano); MOHAMED ALI KAAFAR; UZUN (Ersin)
AF : INRIA Rhone-Alpes/France (1 aut., 3 aut.); PARC/Palo Alto, CA/Etats-Unis (2 aut., 4 aut.); NICTA/Australie (3 aut.)
DT : Publication en série; Niveau analytique
SO : Computer communication review; ISSN 0146-4833; Etats-Unis; Da. 2013; Vol. 43; No. 3; Pp. 26-33; Bibl. 54 ref.
LA : Anglais
EA : As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.
CC : 001D02B04; 001D02B07C
FD : Vie privée; Internet; Extensibilité; Mobilité; Sécurité informatique; Antémémoire; Gestion mémoire; Confidentialité; Architecture réseau; Dénomination; Analyse risque; Anonymat; Niveau; Censure; Traçabilité; .
ED : Private life; Internet; Scalability; Mobility; Computer security; Cache memory; Storage management; Confidentiality; Network architecture; Naming; Risk analysis; Anonymity; Level; Censorship; Traceability
SD : Vida privada; Internet; Estensibilidad; Movilidad; Seguridad informatica; Antememoria; Gestión memoria; Confidencialidad; Arquitectura red; Denominación; Análisis riesgo; Anonimato; Nivel; Censura; Rastreabilidad
LO : INIST-28172.354000503896500030
ID : 13-0295001

Links to Exploration step

Pascal:13-0295001

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Privacy in Content-Oriented Networking: Threats and Countermeasures</title>
<author>
<name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
<affiliation>
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
<affiliation>
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
<affiliation>
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
<affiliation>
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">13-0295001</idno>
<date when="2013">2013</date>
<idno type="stanalyst">PASCAL 13-0295001 INIST</idno>
<idno type="RBID">Pascal:13-0295001</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000843</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Privacy in Content-Oriented Networking: Threats and Countermeasures</title>
<author>
<name sortKey="Chaabane, Abdelberi" sort="Chaabane, Abdelberi" uniqKey="Chaabane A" first="Abdelberi" last="Chaabane">Abdelberi Chaabane</name>
<affiliation>
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="De Cristofaro, Emiliano" sort="De Cristofaro, Emiliano" uniqKey="De Cristofaro E" first="Emiliano" last="De Cristofaro">Emiliano De Cristofaro</name>
<affiliation>
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Mohamed Ali Kaafar" sort="Mohamed Ali Kaafar" uniqKey="Mohamed Ali Kaafar" last="Mohamed Ali Kaafar">MOHAMED ALI KAAFAR</name>
<affiliation>
<inist:fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Uzun, Ersin" sort="Uzun, Ersin" uniqKey="Uzun E" first="Ersin" last="Uzun">Ersin Uzun</name>
<affiliation>
<inist:fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Computer communication review</title>
<title level="j" type="abbreviated">Comput. commun. rev.</title>
<idno type="ISSN">0146-4833</idno>
<imprint>
<date when="2013">2013</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Computer communication review</title>
<title level="j" type="abbreviated">Comput. commun. rev.</title>
<idno type="ISSN">0146-4833</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Anonymity</term>
<term>Cache memory</term>
<term>Censorship</term>
<term>Computer security</term>
<term>Confidentiality</term>
<term>Internet</term>
<term>Level</term>
<term>Mobility</term>
<term>Naming</term>
<term>Network architecture</term>
<term>Private life</term>
<term>Risk analysis</term>
<term>Scalability</term>
<term>Storage management</term>
<term>Traceability</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Vie privée</term>
<term>Internet</term>
<term>Extensibilité</term>
<term>Mobilité</term>
<term>Sécurité informatique</term>
<term>Antémémoire</term>
<term>Gestion mémoire</term>
<term>Confidentialité</term>
<term>Architecture réseau</term>
<term>Dénomination</term>
<term>Analyse risque</term>
<term>Anonymat</term>
<term>Niveau</term>
<term>Censure</term>
<term>Traçabilité</term>
<term>.</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0146-4833</s0>
</fA01>
<fA03 i2="1">
<s0>Comput. commun. rev.</s0>
</fA03>
<fA05>
<s2>43</s2>
</fA05>
<fA06>
<s2>3</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>Privacy in Content-Oriented Networking: Threats and Countermeasures</s1>
</fA08>
<fA11 i1="01" i2="1">
<s1>CHAABANE (Abdelberi)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>DE CRISTOFARO (Emiliano)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>MOHAMED ALI KAAFAR</s1>
</fA11>
<fA11 i1="04" i2="1">
<s1>UZUN (Ersin)</s1>
</fA11>
<fA14 i1="01">
<s1>INRIA Rhone-Alpes</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>PARC</s1>
<s2>Palo Alto, CA</s2>
<s3>USA</s3>
<sZ>2 aut.</sZ>
<sZ>4 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>NICTA</s1>
<s3>AUS</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20>
<s1>26-33</s1>
</fA20>
<fA21>
<s1>2013</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>28172</s2>
<s5>354000503896500030</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2013 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>54 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>13-0295001</s0>
</fA47>
<fA60>
<s1>P</s1>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Computer communication review</s0>
</fA64>
<fA66 i1="01">
<s0>USA</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02B04</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D02B07C</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Vie privée</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Private life</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Vida privada</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Internet</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Extensibilité</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Scalability</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Estensibilidad</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Mobilité</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Mobility</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Movilidad</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Sécurité informatique</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Computer security</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Seguridad informatica</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Antémémoire</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Cache memory</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Antememoria</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Gestion mémoire</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Storage management</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Gestión memoria</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Confidentialité</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Confidentiality</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA">
<s0>Confidencialidad</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>Architecture réseau</s0>
<s5>19</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG">
<s0>Network architecture</s0>
<s5>19</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA">
<s0>Arquitectura red</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE">
<s0>Dénomination</s0>
<s5>20</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG">
<s0>Naming</s0>
<s5>20</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA">
<s0>Denominación</s0>
<s5>20</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE">
<s0>Analyse risque</s0>
<s5>21</s5>
</fC03>
<fC03 i1="11" i2="X" l="ENG">
<s0>Risk analysis</s0>
<s5>21</s5>
</fC03>
<fC03 i1="11" i2="X" l="SPA">
<s0>Análisis riesgo</s0>
<s5>21</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE">
<s0>Anonymat</s0>
<s5>22</s5>
</fC03>
<fC03 i1="12" i2="X" l="ENG">
<s0>Anonymity</s0>
<s5>22</s5>
</fC03>
<fC03 i1="12" i2="X" l="SPA">
<s0>Anonimato</s0>
<s5>22</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE">
<s0>Niveau</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG">
<s0>Level</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="SPA">
<s0>Nivel</s0>
<s5>23</s5>
</fC03>
<fC03 i1="14" i2="X" l="FRE">
<s0>Censure</s0>
<s5>24</s5>
</fC03>
<fC03 i1="14" i2="X" l="ENG">
<s0>Censorship</s0>
<s5>24</s5>
</fC03>
<fC03 i1="14" i2="X" l="SPA">
<s0>Censura</s0>
<s5>24</s5>
</fC03>
<fC03 i1="15" i2="X" l="FRE">
<s0>Traçabilité</s0>
<s5>25</s5>
</fC03>
<fC03 i1="15" i2="X" l="ENG">
<s0>Traceability</s0>
<s5>25</s5>
</fC03>
<fC03 i1="15" i2="X" l="SPA">
<s0>Rastreabilidad</s0>
<s5>25</s5>
</fC03>
<fC03 i1="16" i2="X" l="FRE">
<s0>.</s0>
<s4>INC</s4>
<s5>82</s5>
</fC03>
<fN21>
<s1>280</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
</standard>
<server>
<NO>PASCAL 13-0295001 INIST</NO>
<ET>Privacy in Content-Oriented Networking: Threats and Countermeasures</ET>
<AU>CHAABANE (Abdelberi); DE CRISTOFARO (Emiliano); MOHAMED ALI KAAFAR; UZUN (Ersin)</AU>
<AF>INRIA Rhone-Alpes/France (1 aut., 3 aut.); PARC/Palo Alto, CA/Etats-Unis (2 aut., 4 aut.); NICTA/Australie (3 aut.)</AF>
<DT>Publication en série; Niveau analytique</DT>
<SO>Computer communication review; ISSN 0146-4833; Etats-Unis; Da. 2013; Vol. 43; No. 3; Pp. 26-33; Bibl. 54 ref.</SO>
<LA>Anglais</LA>
<EA>As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modem systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than hosts. CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at the data level. However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges. In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. Finally, we present a comparison between CON and today's Internet in the context of a few privacy concepts, such as, anonymity, censoring, traceability, and confidentiality.</EA>
<CC>001D02B04; 001D02B07C</CC>
<FD>Vie privée; Internet; Extensibilité; Mobilité; Sécurité informatique; Antémémoire; Gestion mémoire; Confidentialité; Architecture réseau; Dénomination; Analyse risque; Anonymat; Niveau; Censure; Traçabilité; .</FD>
<ED>Private life; Internet; Scalability; Mobility; Computer security; Cache memory; Storage management; Confidentiality; Network architecture; Naming; Risk analysis; Anonymity; Level; Censorship; Traceability</ED>
<SD>Vida privada; Internet; Estensibilidad; Movilidad; Seguridad informatica; Antememoria; Gestión memoria; Confidencialidad; Arquitectura red; Denominación; Análisis riesgo; Anonimato; Nivel; Censura; Rastreabilidad</SD>
<LO>INIST-28172.354000503896500030</LO>
<ID>13-0295001</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000843 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000843 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:13-0295001
   |texte=   Privacy in Content-Oriented Networking: Threats and Countermeasures
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024