{"id":"https://openalex.org/W4226075628","doi":"https://doi.org/10.1002/dac.5169","title":"An interest\u2010based access control scheme via edge verification in Named Data Networking","display_name":"An interest\u2010based access control scheme via edge verification in Named Data Networking","publication_year":2022,"publication_date":"2022-04-06","ids":{"openalex":"https://openalex.org/W4226075628","doi":"https://doi.org/10.1002/dac.5169"},"language":"en","primary_location":{"id":"doi:10.1002/dac.5169","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.5169","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027309143","display_name":"Yu Tao","orcid":"https://orcid.org/0000-0002-3626-867X"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Tao","raw_affiliation_strings":["School of Computer Science and Communication Engineering Jiangsu University Zhen Jiang China","School of Computer Science and Communication Engineering, Jiangsu University, Zhen Jiang, China"],"raw_orcid":"https://orcid.org/0000-0002-3626-867X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering Jiangsu University Zhen Jiang China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhen Jiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004049350","display_name":"Yi Zhu","orcid":"https://orcid.org/0000-0003-2625-9953"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Zhu","raw_affiliation_strings":["Jiangsu Key Laboratory of Security Tech.for Industrial Cyberspace Jiangsu University Zhen Jiang China","School of Computer Science and Communication Engineering Jiangsu University Zhen Jiang China","School of Computer Science and Communication Engineering, Jiangsu University, Zhen Jiang, China","Jiangsu Key Laboratory of Security Tech.for Industrial Cyberspace, Jiangsu University, Zhen Jiang, China"],"raw_orcid":"https://orcid.org/0000-0003-2625-9953","affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Tech.for Industrial Cyberspace Jiangsu University Zhen Jiang China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering Jiangsu University Zhen Jiang China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhen Jiang, China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Tech.for Industrial Cyberspace, Jiangsu University, Zhen Jiang, China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004049350"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":{"value":3450,"currency":"USD","value_usd":3450},"apc_paid":null,"fwci":0.428,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62177998,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"35","issue":"10","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.942799985408783,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.882271409034729},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.704218327999115},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6566144227981567},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.6093370914459229},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4547540247440338},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.44811469316482544},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4237414002418518}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.882271409034729},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.704218327999115},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6566144227981567},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.6093370914459229},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4547540247440338},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.44811469316482544},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4237414002418518},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/dac.5169","is_oa":false,"landing_page_url":"https://doi.org/10.1002/dac.5169","pdf_url":null,"source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2006757318","https://openalex.org/W2078780635","https://openalex.org/W2085857279","https://openalex.org/W2136452616","https://openalex.org/W2147832797","https://openalex.org/W2242850040","https://openalex.org/W2328136677","https://openalex.org/W2471157485","https://openalex.org/W2590898937","https://openalex.org/W2753419519","https://openalex.org/W2808603859","https://openalex.org/W2886446678","https://openalex.org/W2907106582","https://openalex.org/W2907305569","https://openalex.org/W2963391656","https://openalex.org/W3015267269","https://openalex.org/W3100595238","https://openalex.org/W6681825675"],"related_works":["https://openalex.org/W2369342331","https://openalex.org/W2560112582","https://openalex.org/W2087108869","https://openalex.org/W2922294955","https://openalex.org/W2551637755","https://openalex.org/W1506599706","https://openalex.org/W2133900948","https://openalex.org/W2092662548","https://openalex.org/W2006518659","https://openalex.org/W2808591564"],"abstract_inverted_index":{"Summary":[0],"Named":[1],"Data":[2],"Networking":[3],"(NDN)":[4],"is":[5,37,74,96],"a":[6,35,76],"disruptive":[7],"future":[8],"architecture,":[9],"in":[10,98],"which":[11],"content":[12,36],"delivery":[13],"can":[14,44,119,135],"be":[15],"significantly":[16],"improved":[17],"through":[18,126],"named":[19],"routing":[20],"and":[21,154],"distributed":[22,25],"caching.":[23],"However,":[24],"caching":[26],"also":[27],"leads":[28],"to":[29,39,79,108,123],"serious":[30],"access":[31,51],"control":[32],"problems.":[33],"Once":[34],"disseminated":[38],"the":[40,50,57,103,106,114,116,138,149,156,160],"network,":[41],"any":[42],"entity":[43],"fetch":[45],"it":[46,147],"regardless":[47],"of":[48,151],"owning":[49],"permission":[52],"or":[53],"not.":[54],"To":[55],"protect":[56],"authorized":[58],"content,":[59],"current":[60],"solutions":[61],"are":[62],"mainly":[63],"designed":[64],"based":[65],"on":[66,84,159],"data":[67],"packet":[68],"encryption,":[69],"but":[70],"redundant":[71],"in\u2010network":[72,139],"traffic":[73],"still":[75],"challenge":[77],"due":[78],"illegal":[80],"interest\u2010data":[81],"exchange.":[82],"Focus":[83],"this":[85,99],"problem,":[86],"an":[87],"Interest\u2010Based":[88],"Access":[89],"Control":[90],"scheme":[91],"via":[92],"Edge":[93],"Verification":[94],"(IBAC\u2010EV)":[95],"proposed":[97],"paper.":[100],"In":[101],"IBAC\u2010EV,":[102],"producer":[104],"authorizes":[105],"user":[107],"sign":[109],"interest":[110,128],"packet.":[111],"By":[112],"checking":[113],"signature,":[115],"edge":[117,161],"router":[118],"forbid":[120],"unsubscribed":[121],"users":[122],"enter":[124],"network":[125],"discarding":[127],"packets.":[129],"Simulation":[130],"results":[131],"show":[132],"that":[133],"IBAC\u2010EV":[134],"effectively":[136],"reduce":[137],"traffic.":[140],"Moreover,":[141],"by":[142],"using":[143],"proxy":[144],"signature":[145],"algorithm,":[146],"simplifies":[148],"complexity":[150],"key":[152],"management":[153],"alleviates":[155],"storage":[157],"overhead":[158],"router.":[162]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
