{"id":"https://openalex.org/W2505686982","doi":"https://doi.org/10.1109/icc.2016.7511198","title":"DACPI: A decentralized access control protocol for information centric networking","display_name":"DACPI: A decentralized access control protocol for information centric networking","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2505686982","doi":"https://doi.org/10.1109/icc.2016.7511198","mag":"2505686982"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2016.7511198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7511198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079845675","display_name":"Eslam G. AbdAllah","orcid":"https://orcid.org/0000-0001-7669-3016"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Eslam G. AbdAllah","raw_affiliation_strings":["School of Computing, Queen's University, Kingston, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005563986","display_name":"Mohammad Zulkernine","orcid":"https://orcid.org/0000-0003-1697-4101"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Zulkernine","raw_affiliation_strings":["School of Computing, Queen's University, Kingston, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021196543","display_name":"Hossam S. Hassanein","orcid":"https://orcid.org/0000-0003-0260-8979"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hossam S. Hassanein","raw_affiliation_strings":["School of Computing, Queen's University, Kingston, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079845675"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":3.1849,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.92447829,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9611999988555908,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7981446981430054},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7225390672683716},{"id":"https://openalex.org/keywords/information-centric-networking","display_name":"Information-centric networking","score":0.6060092449188232},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6024873852729797},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5916444063186646},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.565588116645813},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5041996240615845},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.49595436453819275},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4675140976905823},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.45931437611579895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44880300760269165},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4417101740837097},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1370786726474762},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.07720836997032166}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7981446981430054},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7225390672683716},{"id":"https://openalex.org/C2777455782","wikidata":"https://www.wikidata.org/wiki/Q18208068","display_name":"Information-centric networking","level":3,"score":0.6060092449188232},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6024873852729797},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5916444063186646},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.565588116645813},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5041996240615845},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.49595436453819275},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4675140976905823},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.45931437611579895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44880300760269165},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4417101740837097},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1370786726474762},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.07720836997032166},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2016.7511198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7511198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W403293540","https://openalex.org/W1504330774","https://openalex.org/W1534162064","https://openalex.org/W1995965669","https://openalex.org/W2021968005","https://openalex.org/W2051151610","https://openalex.org/W2063939659","https://openalex.org/W2122642161","https://openalex.org/W2136452616","https://openalex.org/W2150010995","https://openalex.org/W2204560043","https://openalex.org/W2294310114","https://openalex.org/W2615055121","https://openalex.org/W3015267269","https://openalex.org/W3100595238","https://openalex.org/W4235016406","https://openalex.org/W6697008960"],"related_works":["https://openalex.org/W2045828497","https://openalex.org/W2745079549","https://openalex.org/W3088221932","https://openalex.org/W2885669284","https://openalex.org/W3003766419","https://openalex.org/W2949332247","https://openalex.org/W4210343899","https://openalex.org/W2807433688","https://openalex.org/W2049663556","https://openalex.org/W4200201149"],"abstract_inverted_index":{"Current":[0],"Internet":[1,30],"architecture":[2],"is":[3,21,39],"becoming":[4],"inadequate":[5],"for":[6,26,88,100,129],"new":[7],"requirements":[8],"of":[9,15,23,41,45,72],"highly":[10],"scalable":[11],"and":[12,107,139],"efficient":[13],"distribution":[14],"contents.":[16,36,77],"Information":[17],"Centric":[18],"Networking":[19],"(ICN)":[20],"one":[22,40],"the":[24,27,42,70,111,130,144],"alternatives":[25],"Next":[28],"Generation":[29],"(NGI),":[31],"which":[32,47],"focuses":[33],"mainly":[34],"on":[35,118,127],"In-network":[37],"caching":[38],"major":[43],"attributes":[44],"ICN,":[46],"allows":[48],"contents":[49,62,153],"to":[50,75,143,151],"be":[51],"cached":[52],"in":[53],"any":[54],"ICN":[55,61,76,89,105,108,119,152],"node.":[56],"Any":[57],"user":[58],"can":[59],"access":[60,74,101,113,150],"from":[63],"different":[64],"distributed":[65],"locations.":[66],"This":[67],"attribute":[68],"maximizes":[69],"problem":[71],"unauthorized":[73,149],"In":[78,92],"this":[79,93],"paper,":[80],"we":[81],"propose":[82],"a":[83],"Decentralized":[84],"Access":[85],"Control":[86],"Protocol":[87],"architectures":[90],"(DACPI).":[91],"protocol,":[94],"fewer":[95,155],"public":[96],"messages":[97,156],"are":[98],"needed":[99],"control":[102,114],"enforcement":[103],"between":[104],"subscribers":[106],"nodes":[109],"than":[110],"existing":[112],"protocols.":[115],"DACPI":[116,128,147],"depends":[117],"self-certifying":[120],"naming":[121],"scheme.":[122],"We":[123],"perform":[124],"security":[125,145],"analysis":[126],"following":[131],"attacks:":[132],"man-in-the-middle,":[133],"forward":[134],"security,":[135],"replay":[136],"attacks,":[137],"integrity,":[138],"privacy":[140],"violations.":[141],"According":[142],"analysis,":[146],"prevents":[148],"with":[154],"passed.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
