{"id":"https://openalex.org/W2575464779","doi":"https://doi.org/10.1145/3041027.3041034","title":"Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy","display_name":"Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy","publication_year":2017,"publication_date":"2017-01-17","ids":{"openalex":"https://openalex.org/W2575464779","doi":"https://doi.org/10.1145/3041027.3041034","mag":"2575464779"},"language":"en","primary_location":{"id":"doi:10.1145/3041027.3041034","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041027.3041034","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCOMM Computer Communication Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077317339","display_name":"Edith C.\u2010H. Ngai","orcid":"https://orcid.org/0000-0002-3454-8731"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Edith Ngai","raw_affiliation_strings":["Uppsala University, SE"],"affiliations":[{"raw_affiliation_string":"Uppsala University, SE","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019753421","display_name":"B\u00f6rje Ohlman","orcid":null},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"B\u00f6rje Ohlman","raw_affiliation_strings":["Ericsson Research, SE"],"affiliations":[{"raw_affiliation_string":"Ericsson Research, SE","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California Irvine"],"affiliations":[{"raw_affiliation_string":"University of California Irvine","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007398036","display_name":"Ersin Uzun","orcid":null},"institutions":[{"id":"https://openalex.org/I173498003","display_name":"Palo Alto Research Center","ror":"https://ror.org/0529fxt39","country_code":"US","type":"facility","lineage":["https://openalex.org/I173498003","https://openalex.org/I4210132870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ersin Uzun","raw_affiliation_strings":["Xerox PARC"],"affiliations":[{"raw_affiliation_string":"Xerox PARC","institution_ids":["https://openalex.org/I173498003"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039216100","display_name":"Matthias W\u00e4hlisch","orcid":"https://orcid.org/0000-0002-3825-2807"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matthias W\u00e4hlisch","raw_affiliation_strings":["Freie University Berlin, DE"],"affiliations":[{"raw_affiliation_string":"Freie University Berlin, DE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059586610","display_name":"Christopher A. Wood","orcid":"https://orcid.org/0000-0003-3297-4216"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christopher A. Wood","raw_affiliation_strings":["University of California Irvine"],"affiliations":[{"raw_affiliation_string":"University of California Irvine","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5077317339"],"corresponding_institution_ids":["https://openalex.org/I123387679"],"apc_list":null,"apc_paid":null,"fwci":1.8648,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.87114304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"47","issue":"1","first_page":"49","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7776678800582886},{"id":"https://openalex.org/keywords/information-centric-networking","display_name":"Information-centric networking","score":0.7616226673126221},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7543781995773315},{"id":"https://openalex.org/keywords/namespace","display_name":"Namespace","score":0.7090328931808472},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6113088130950928},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6006301641464233},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5536363124847412},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5226718783378601},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29954463243484497},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1171976625919342}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7776678800582886},{"id":"https://openalex.org/C2777455782","wikidata":"https://www.wikidata.org/wiki/Q18208068","display_name":"Information-centric networking","level":3,"score":0.7616226673126221},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7543781995773315},{"id":"https://openalex.org/C2778383056","wikidata":"https://www.wikidata.org/wiki/Q873636","display_name":"Namespace","level":2,"score":0.7090328931808472},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6113088130950928},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6006301641464233},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5536363124847412},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5226718783378601},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29954463243484497},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1171976625919342},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3041027.3041034","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041027.3041034","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCOMM Computer Communication Review","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W39174473","https://openalex.org/W1504330774","https://openalex.org/W1534162064","https://openalex.org/W1603068992","https://openalex.org/W1604658764","https://openalex.org/W1763482972","https://openalex.org/W1862105587","https://openalex.org/W1912248131","https://openalex.org/W1995965669","https://openalex.org/W2018793106","https://openalex.org/W2042539274","https://openalex.org/W2062805799","https://openalex.org/W2132718467","https://openalex.org/W2136452616","https://openalex.org/W2232908711","https://openalex.org/W2282463261","https://openalex.org/W2286564145","https://openalex.org/W2293834218","https://openalex.org/W2293993025","https://openalex.org/W2294620612","https://openalex.org/W2512103536","https://openalex.org/W2515599735","https://openalex.org/W2533022194","https://openalex.org/W2962973644","https://openalex.org/W3031387235","https://openalex.org/W3100595238","https://openalex.org/W3125100762","https://openalex.org/W6601586381","https://openalex.org/W6636027756","https://openalex.org/W6636336946","https://openalex.org/W6637979471","https://openalex.org/W6649046285","https://openalex.org/W6654759463","https://openalex.org/W6661198176","https://openalex.org/W6695516227","https://openalex.org/W6725944989"],"related_works":["https://openalex.org/W2370740425","https://openalex.org/W2912172084","https://openalex.org/W2295002787","https://openalex.org/W4233446872","https://openalex.org/W3017834062","https://openalex.org/W4205941804","https://openalex.org/W4365137467","https://openalex.org/W1590066213","https://openalex.org/W2575464779","https://openalex.org/W2961538091"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"Information-centric":[3],"Networking":[4,113],"(ICN)":[5],"has":[6],"received":[7],"much":[8,178],"attention":[9],"from":[10,24],"both":[11,79],"academic":[12],"and":[13,30,40,81,87,94,104,114,127,130,151,158,163,166,181],"industry":[14],"participants.":[15],"ICN":[16,59,85,145],"offers":[17],"data-centric":[18],"inter-networking":[19],"that":[20],"is":[21,78,146,176,187],"radically":[22],"different":[23],"today's":[25,34],"host-based":[26],"IP":[27],"networks.":[28],"Security":[29],"privacy":[31,88,131],"features":[32],"on":[33,111],"Internet":[35],"were":[36],"originally":[37],"not":[38],"present":[39],"have":[41,54],"been":[42],"incrementally":[43],"retrofitted":[44],"over":[45],"the":[46,102,107,139,142,170],"last":[47],"35":[48],"years.":[49],"As":[50],"such,":[51],"these":[52,185,194],"issues":[53,89,132],"become":[55],"increasingly":[56],"important":[57,82],"as":[58,90,92,156],"technology":[60],"gradually":[61],"matures":[62],"towards":[63,192],"real-world":[64],"deployment.":[65],"Thus,":[66],"while":[67],"ICN-based":[68,135],"architectures":[69],"(e.g.,":[70],"NDN,":[71],"CCNx,":[72],"etc.)":[73],"are":[74],"still":[75,147],"evolving,":[76],"it":[77],"timely":[80],"to":[83,121,125,134,189],"explore":[84],"security":[86,129,162],"well":[91],"devise":[93],"assess":[95],"possible":[96],"mitigation":[97],"techniques.":[98],"This":[99],"report":[100],"documents":[101],"highlights":[103],"outcomes":[105],"of":[106,118,144,169,172],"Dagstuhl":[108],"Seminar":[109],"16251":[110],"``Information-centric":[112],"Security.''":[115],"The":[116],"goal":[117],"which":[119],"was":[120],"bring":[122],"together":[123],"researchers":[124],"discuss":[126],"address":[128],"particular":[133],"architectures.":[136],"Upon":[137],"finishing":[138],"three-day":[140],"workshop,":[141],"outlook":[143],"unclear.":[148],"Many":[149],"unsolved":[150],"ill-addressed":[152],"problems":[153],"remain,":[154],"such":[155],"namespace":[157],"identity":[159],"management,":[160],"object":[161],"forward":[164],"secrecy,":[165],"privacy.":[167],"Regardless":[168],"fate":[171],"ICN,":[173],"one":[174],"thing":[175],"certain:":[177],"more":[179],"research":[180],"practical":[182],"experience":[183],"with":[184],"systems":[186],"needed":[188],"make":[190],"progress":[191],"solving":[193],"arduous":[195],"problems.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
