References
- D. Clark, "The design philosophy of the DARPA Internet protocol," ACM Sigcomm Comp. Comm. Review, vol. 18, no. 1, pp. 106-114, Aug. 1988. https://doi.org/10.1145/52325.52336
- C. Park and J. Kim, "An Empirical Research on Information Privacy Concern in the IoT Era," Journal of Digital Convergence, vol.14, no.2, pp.65-72, 2016. 02. https://doi.org/10.14400/JDC.2016.14.2.65
- S. Nam and C. Seo, "Privacy Preserving Source Based Deduplication Method," Journal of Digital Convergence, vol.14, no.2, pp.175-181, 2016. 02. https://doi.org/10.14400/JDC.2016.14.2.175
- C. Park and J. Kim, "An Empirical Research on Information Privacy and Trust Model in the Convergence Era," Journal of Digital Convergence, vol.13, no.4, pp.219-225, 2015. 04. https://doi.org/10.14400/JDC.2015.13.4.219
- S. Kim and S. Yeo, "A Study on Secure Data Access Control in Mobile Cloud Environment," Journal of Digital Convergence, vol.11, no.2, pp.317-322, 2013. 02. https://doi.org/10.14400/JDPM.2013.11.2.317
- Y. Jeong, K. Han, and S. Lee, "Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment," Journal of Digital Convergence, vol.12, no.7, pp.279-284, 2014. 07. https://doi.org/10.14400/JDC.2014.12.7.279
- Keun-Ho Lee, "A Method of Defense and Security Threats in U-Healthcare Service", Journal of the Korea Convergence Society, Vol. 3, No. 4, pp. 1-5, 2012.
- Sik-Wan Cho, Won-Jun Jang, Hyung-Woo Lee, Development of User Oriented Vulnerability Analysis Application on Smart Phone", Journal of the Korea Convergence Society, Vol. 3, No. 2, pp. 7-12, 2012.
- J. Pan, S. Paul and R. Jain, "A Survey of the Research on Future Internet Architectures," IEEE communication magazine, vol 49, no. 7, pp 26-36, July 2011.
- B. Ahlgren, C. Dannewitz, C. Imbrenda, and D. Kutscher, "A survey of information-centric networking," IEEE Communications Magazine, vol. 50, no. 7, pp 26-36, July 2012. https://doi.org/10.1109/MCOM.2012.6231276
- V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," ACM CoNext, pp. 1-12, Dec. 2009.
- PACR, "CCNx Access Control Specifications," July 30, 2010.
- J. Kurihara, E. Uzen, and C. Wood, "An Encryption-based Access Control Framework for Content-Centric Networking," IFIP Networking Conference (IFIP Networking), pp. 1-9, May 2015.
- C. Wood and E. Uzun, "Flexible end-to-end content security in CCN," 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 858-865, Jan. 2014.
- C. Ghali, M. Schlosberg, G. Tsudik, and Christopher Wood, "Interest-based Access Control for Content-Centirc Networks," arXiv preprint, arXiv:1505.06258, 2015.
- R. Touriani, T. Mick, S. Misra, and G. Panwar, "Security, Privacy, and Access Control in Information-Centric Networking: A Survey," arXiv preprint, arXiv:1603.03409, Mar. 2016.
- R. Merkle, "Protocols for public key cryptosystems," In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 122-134, Apr. 1980.