期刊文献+

内容中心网络(CCN)关键技术分析 被引量:1

下载PDF
导出
摘要 随着大数据时代的到来,人们更需要高效、安全、便捷的获取数据。现有网络体系结构自身存在缺陷,国内、外专家针对这些缺陷提出了许多改进方法,其中之一是内容中心网络CCN最为引起专家的重视。
出处 《信息系统工程》 2014年第11期30-30,共1页
  • 相关文献

参考文献1

二级参考文献29

  • 1Saltzer. J.H., Reed. D.P., Clark. D.D. End-To-End Arguments in System Design[J], ACM TOCS, Vol 2, Number 4,November 1984, 277-288.
  • 2David D, Clark. The Design Philosophy of the DARPA Internet Protocols[C]. ACM SIGCOMM 1988.
  • 3A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti and S. Shenker. Naming in Content-Oriented Architectures[C]. In Proc of SIGCOMM Workshop on ICN, 2011.
  • 4CCNx project[EB/OL], https://www.ccnx.org/, 2011-12-12.
  • 5A. Anand, F. Dogar, D. Han, B. Li, H. Lira, M. Machadoy, W. Wu,A. Akella, D. Andersen, J. Byersy, S. Seshan, and P. Steenkiste. XIA:An Architecture for an Evolvable and Trustworthy 'Internet[R]. Technical Report CMU-CS-11-100, CMU, February 2011.
  • 6B. Ahlgren, C. Danuewitz, C. Imbrenda, D. Kutscher,and B. Ohlman. A Survey of Information-Centric Networking (Draft) [Z]. In B. Ahlgren, H. Karl,D. Kutscher, B. Ohlman, S. Oueslati, and I. Solis,editors, Information-Centric Networking, number 10492 in Dagstuhl Seminar Proceedings, Dagstuhl,Germany, 2011.
  • 7Dirk Trossen, Mikko Sarela, and Karen Sollins. Arguments for an information-centric internetworking architecture[J]. ACM Computer Communications Review, 2010, 40(04): 26-33.
  • 8All Ghodsi,Teemu Koponen,Barath Raghavan,Scott Shenker,Ankit Singla,James Wilcox. Information-Centric Networking: Seeing the Forest for the Trees[C]. Hornets, 2011, 11:14-15.
  • 9Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass,Nicholas H. Briggs, Rebecca L. Braynard, Networking Named Content[C], CoNext,Rome, Italy, 2009.
  • 10L. Zhang et al. Named data networking (ndn) project[R]. Technical Report NDN-0001, October 2010.

共引文献32

同被引文献11

  • 1Jacobson V, Smetters D K, Thornton J D, et al. Networking Named Content[C]//Proceeding of the 5th ACM International Conference on Emerging Networking Experi- ments and Technologies (CoNEXT' 09). Washington: ACM,2009 : 1-12.
  • 2Trossen D, Sarela M, Sollins K. Arguments for an Information-centric Internetworking Architecture[J]. ACM Computer Communications Review, 2010, 40(4): 26-33.
  • 3Bellare M, Namprempre C. Authenticated Encryption: Rela tions Among Notions and Analysis of the Generic Composi tion Paradigm[J]. Journal of Cryptology, 2008,21(4), 14- 21.
  • 4Sweeney L. K-anonymity:A Model for Protecting Privacy[J].International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002,10 (5) : 557 - 570.
  • 5Chen Y, Ma J H, Feng Q J, et al. Nonlacal Prior Bayesian Tomographic Reconstruction[J]. Journal of Mathematical Imaging and Vision, 2008,30(2) : 133- 146.
  • 6Machanavajjhala A, Gehrke J, Kifer D. 1-diversity: priva cy beyond k-anonymity[C]//Proc, of the 22th Interna tional Conference on Data Engineering. Washington ACM Press, 2006.
  • 7Koponen T, Chawla M, Chun B, et al. A Data-oriented (and Beyond) Network Architecture[J]. ACM SIG- COMM Computer Communication Review, 2007,37 (4) : 181-192.
  • 8Sweeney L. Achieving k-anonymity Privacy Protection Using Generalization and Suppression[J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002,10(5) : 571- 588.
  • 9闵二龙,陈震,许宏峰,梁勇.内容中心网络CCN研究进展探析[J].信息网络安全,2012(2):6-10. 被引量:33
  • 10李军,陈震,石希.ICN体系结构与技术研究[J].信息网络安全,2012(4):75-80. 被引量:14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部