Abstract:
Many trust management systems implicitly assume that the required credentials can be obtained without difficulty. In consequence, it is necessary to have a convenient way...View moreMetadata
Abstract:
Many trust management systems implicitly assume that the required credentials can be obtained without difficulty. In consequence, it is necessary to have a convenient way to discover desired credentials in the network for successful deployment of trust management systems. Obviously, in distributed environments, this assumption may not be easy to achieve due to failure of different components. In this paper, based on a content centric network architecture, we show that a simple naming convention can help to provide scalability, reliability and availability in retrieving desired credentials. Especially, our scheme utilizes the routing protocol provided by the content centric network, without constructing an overlay network as in Peer-to-Peer systems.
Date of Conference: 26-28 January 2011
Date Added to IEEE Xplore: 03 March 2011
ISBN Information: