{"id":"https://openalex.org/W2997835599","doi":"https://doi.org/10.1155/2019/3107543","title":"QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation","display_name":"QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation","publication_year":2019,"publication_date":"2019-12-28","ids":{"openalex":"https://openalex.org/W2997835599","doi":"https://doi.org/10.1155/2019/3107543","mag":"2997835599"},"language":"en","primary_location":{"id":"doi:10.1155/2019/3107543","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/3107543","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3107543.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/3107543.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027759040","display_name":"Abdulrahman Al-Dailami","orcid":"https://orcid.org/0000-0002-1296-542X"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]},{"id":"https://openalex.org/I170535673","display_name":"Sana'a University","ror":"https://ror.org/04hcvaf32","country_code":"YE","type":"education","lineage":["https://openalex.org/I170535673"]}],"countries":["CN","YE"],"is_corresponding":false,"raw_author_name":"Abdulrahman Al-Dailami","raw_affiliation_strings":["Faculty of Computer and Information Technology, Sana\u2019a University, Sana\u2019a, Yemen","School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer and Information Technology, Sana\u2019a University, Sana\u2019a, Yemen","institution_ids":["https://openalex.org/I170535673"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047639217","display_name":"Chang Ruan","orcid":"https://orcid.org/0000-0003-3576-1208"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang Ruan","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101472662","display_name":"Zhihong Bao","orcid":"https://orcid.org/0000-0003-1324-1287"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Bao","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100375798","display_name":"Tao Zhang","orcid":"https://orcid.org/0000-0002-3369-9220"},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Changsha University, Changsha 410083, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Changsha University, Changsha 410083, China","institution_ids":["https://openalex.org/I198357462"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047639217"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.3708,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66749637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8776513934135437},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.6277234554290771},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.6048206686973572},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5558983683586121},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5510483384132385},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5357569456100464},{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.5177792310714722},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5068967938423157},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4748416543006897},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46900177001953125},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.4272814393043518},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41467106342315674},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3172132968902588}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8776513934135437},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.6277234554290771},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.6048206686973572},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5558983683586121},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5510483384132385},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5357569456100464},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.5177792310714722},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5068967938423157},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4748416543006897},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46900177001953125},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.4272814393043518},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41467106342315674},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3172132968902588},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/3107543","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/3107543","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3107543.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f72d09738acd46d1bd6d16ec5c01027c","is_oa":true,"landing_page_url":"https://doaj.org/article/f72d09738acd46d1bd6d16ec5c01027c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2019/3107543","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3107543","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2019/3107543","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/3107543","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3107543.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1552835063","display_name":null,"funder_award_id":"61972421","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3820897065","display_name":null,"funder_award_id":"61872403","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2997835599.pdf","grobid_xml":"https://content.openalex.org/works/W2997835599.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2107248536","https://openalex.org/W2122642161","https://openalex.org/W2130741436","https://openalex.org/W2212069919","https://openalex.org/W2766644800","https://openalex.org/W2786306128","https://openalex.org/W2911627113","https://openalex.org/W2913192077","https://openalex.org/W2914493727","https://openalex.org/W4233865259"],"related_works":["https://openalex.org/W115332106","https://openalex.org/W1591695585","https://openalex.org/W3183911098","https://openalex.org/W4238454263","https://openalex.org/W2559470891","https://openalex.org/W4245844877","https://openalex.org/W4248360724","https://openalex.org/W1975904519","https://openalex.org/W4386088672","https://openalex.org/W2395015381"],"abstract_inverted_index":{"With":[0],"the":[1,40,47,54,67,110,113,118,149,170,173,185,210,214,218,222,241,256,307,311],"ever-increasing":[2],"concern":[3],"in":[4,148,221,270],"network":[5],"security":[6],"and":[7,76,98,116,152,172,266,287,310],"privacy,":[8],"a":[9,86,226,262],"major":[10],"portion":[11],"of":[12,25,42,56,112,120,264],"Internet":[13,26],"traffic":[14],"is":[15,28,85,297],"encrypted":[16],"now.":[17],"Recent":[18],"research":[19],"shows":[20],"that":[21,62,88,138,156,276],"more":[22],"than":[23],"70%":[24],"content":[27,58,115],"transmitted":[29],"using":[30,104],"HyperText":[31],"Transfer":[32],"Protocol":[33],"Secure":[34],"(HTTPS).":[35],"However,":[36],"HTTPS":[37,114,187,228,258,291],"encryption":[38],"eliminates":[39],"advantages":[41],"many":[43],"intermediate":[44],"services":[45],"like":[46],"caching":[48,102,150,207,223],"proxy,":[49],"which":[50,84,144,252],"can":[51,89,145],"significantly":[52],"degrade":[53],"performance":[55,269],"web":[57,129,174],"delivery.":[59],"We":[60,260],"argue":[61],"these":[63],"restrictions":[64],"lead":[65],"to":[66,72,96,189,202,205,216,231,306],"need":[68],"for":[69,141,159,176,179],"other":[70],"mechanisms":[71],"access":[73],"sites":[74],"quickly":[75],"safely.":[77],"In":[78,125],"this":[79],"paper,":[80],"we":[81,127],"introduce":[82],"QoS3,":[83,126],"protocol":[87,188],"overcome":[90],"such":[91],"limitations":[92],"by":[93,244],"allowing":[94,213],"clients":[95,201,215],"explicitly":[97],"securely":[99],"re-introduce":[100],"in-network":[101],"proxies":[103],"fine-grained":[105],"trust":[106,204],"delegation":[107],"without":[108,192],"compromising":[109],"integrity":[111],"modifying":[117],"format":[119],"Transport":[121],"Layer":[122],"Security":[123],"(TLS).":[124],"classify":[128],"page":[130,281],"contents":[131,137,155,220,243],"into":[132],"two":[133,165],"types:":[134],"(1)":[135],"public":[136,197,237,242],"are":[139,157,253],"common":[140],"all":[142],"users,":[143],"be":[146],"stored":[147],"proxies,":[151],"(2)":[153],"private":[154,180],"specific":[158,206],"each":[160],"user.":[161],"Correspondingly,":[162],"QoS3":[163,182,199,239,265,277,296],"establishes":[164],"separate":[166],"TLS":[167],"connections":[168],"between":[169,285],"client":[171],"server":[175],"them.":[177],"Specifically,":[178],"contents,":[181,198,238],"just":[183,302],"leverages":[184],"original":[186,257],"deliver":[190],"them,":[191],"involving":[193],"any":[194],"middlebox.":[195,312],"For":[196],"allows":[200],"delegate":[203],"proxy":[208,224],"along":[209],"path,":[211],"thereby":[212],"use":[217],"cached":[219],"via":[225],"delegated":[227],"connection.":[229,259],"Meanwhile,":[230],"prevent":[232],"Man-in-the-Middle":[233],"(MitM)":[234],"attacks":[235],"on":[236,280],"validates":[240],"employing":[245],"Document":[246],"object":[247],"Model":[248],"(DoM)":[249],"object-level":[250],"checksums,":[251],"delivered":[254],"through":[255],"implement":[261],"prototype":[263],"evaluate":[267],"its":[268],"our":[271],"testbed.":[272],"Experimental":[273],"results":[274],"show":[275],"provides":[278],"acceleration":[279],"load":[282],"time":[283],"ranging":[284],"30%":[286],"64%":[288],"over":[289],"traditional":[290],"with":[292],"negligible":[293],"overhead.":[294],"Moreover,":[295],"deployable":[298],"since":[299],"it":[300],"requires":[301],"minor":[303],"software":[304],"modifications":[305],"server,":[308],"client,":[309]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
