skip to main content
review-article
Open Access

Anticipating policy and social implications of named data networking

Published:01 December 2016Publication History
Skip Abstract Section

Abstract

Considering the social impact of a proposed future Internet architecture.

References

  1. Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E. and Zhang, L. Interest flooding attack and countermeasures in Named Data Networking. IFIP Networking Conference, 2013, 1--9.Google ScholarGoogle Scholar
  2. Agyapong, P.K. and Sirbu, M. Economic incentives in information-centric networking: Implications for protocol design and public policy. IEEE Commun. Mag. 50, 12 (2012), 18--26.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bannis, A. and Burke, J.A. Creating a secure, integrated home network of things with Named Data Networking. UCLA, 2015, Los Angeles, CA.Google ScholarGoogle Scholar
  4. Baxter, G. and Sommerville, I. 2011. Socio-technical systems: From design methods to systems engineering. Interacting with Computers 23, 1 (2011), 4--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bendrath, R. and Mueller, M. The end of the net as we know it? Deep packet inspection and Internet governance. New Media & Society 13, 7 (2011), 1142--1160.Google ScholarGoogle ScholarCross RefCross Ref
  6. Best, M.L. and Wade, K.W. Democratic and anti-Democratic regulators of the Internet: A framework. The Information Society 23, 5 (2007), 405--411, Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Blanchette, J.-F. and Johnson, D.G. Data retention and the panoptic society: the social benefits of forgetfulness. The Information Society 18 (2002), 33--45.Google ScholarGoogle ScholarCross RefCross Ref
  8. Burke, J.A., Gasti, P., Nathan, N. and Tsudik, G. Securing instrumented environments over content-centric networking: the case of lighting control. In Proceedings of IEEE INFOCOMM 2013 NOMEN Workshop. Retrieved Aug.7, 2015; http://named-data.net/publications/nomen13/Google ScholarGoogle Scholar
  9. Chaabane, A., De Cristofaro, E., Kaafar, M.A. and Uzun, E. 2013. Privacy in content-oriented networking: Threats and countermeasures. SIGCOMM Comput. Commun. Rev. 43, 3 (2013), 25--33 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Citron, D.K. Civil rights in our information age. In The offensive internet: privacy, speech, and reputation. Harvard University Press, Cambridge, MA and London, 2010, 31--49.Google ScholarGoogle Scholar
  11. Clark, D.D., Bauer, S., Lehr, W. et al. Measurement and analysis of Internet interconnection and congestion. In Proceedings of the 42nd Research Conference on Communication, Information, and Internet Policy. Social Science Research Network, 2014. Retrieved Aug. 17, 2015; http://papers.ssrn.com.proxy-um.researchport.umd.edu/abstract=2417573Google ScholarGoogle Scholar
  12. Clark, D.D., Wroclawski, J., Sollins, K.R. and Braden, R. Tussle in cyberspace: Defining tomorrow's Internet. In Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM, 347--356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Cohen, J.E. A right to read anonymously: A closer look at "copyright management" in cyberspace. Connecticut Law Review 28 (1996), 981--1039.Google ScholarGoogle Scholar
  14. Compagno, A. Conti, M., Gasti, P. and Tsudik, G. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. In Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks, 630--638.Google ScholarGoogle Scholar
  15. Cooke, L. 2007. Controlling the net: European approaches to content and access regulation. Journal of Information Science 33, 3 (2007), 360--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. DeNardis. L. Hidden levers of internet control. Information, Communication & Society 15, 5 (2012), 720--738Google ScholarGoogle Scholar
  17. DiBenedetto, S., Gasti, P., Tsudik, G. and Uzun, E. ANDaNA: Anonymous Named Data Networking application. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, Internet Society. Retrieved June 26, 2012; http://arxiv.org/abs/1112.2205Google ScholarGoogle Scholar
  18. Fu, W., Abraham, H.B. and Crowley, P. Synchronizing namespaces with invertible bloom filters. In Proceedings of the 11th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. IEEE Computer Society, 123--134. Retrieved Aug. 17, 2015; http://dl.acm.org/citation.cfm?id=2772722.2772740 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gillespie, T. Wired Shut: Copyright and the Shape of Digital Culture. The MIT Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Google transparency report. 2005. Retrieved Aug. 17, 2015; http://www.google.com/transparencyreport/removals/copyright/Google ScholarGoogle Scholar
  21. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M., Briggs, N. and Braynard, R. Networking named content. Commun. ACM 55, 1 (Jan. 2012), 117--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lessig, L. Code: Version 2.0. Basic Books, New York, NY, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mayer-Schoenberger, V. Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing. Harvard University, Cambridge, MA, 2007.Google ScholarGoogle Scholar
  24. Pfaffenberger, B. Technological dramas. Science, Technology & Human Values 17, 3 (1992), 282--312.Google ScholarGoogle ScholarCross RefCross Ref
  25. Phillips, D.J. From privacy to visibility: Context, identity, and power in ubiquitous computing environments. Social Text 23, 2 (2005), 95--108.Google ScholarGoogle ScholarCross RefCross Ref
  26. Richards, N.M. The perils of social reading. Georgetown Law Journal 101, 3 (2013). Retrieved Apr. 15, 2012; http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2031307Google ScholarGoogle Scholar
  27. Rosen, J. The right to be forgotten. Stanford Law Review Online 64 (2012), 88.Google ScholarGoogle Scholar
  28. Shang, W., Ding, Q., Marianantoni, A., Burke, J. and Zhang, L. Securing building management systems using named data networking. IEEE Network 28, 3 (2014), 50--56.Google ScholarGoogle Scholar
  29. Yu, Y., Afanasyev, A., Clark, D., claffy, kc, Jacobson, V. and Zhang, L. Schematizing and automating trust in Named Data Networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Yu, Y., Afanasyev, A. and Zhang, L. Name-based access control. University of California Los Angeles, CA, 2015.Google ScholarGoogle Scholar
  31. Zhang, L. Estrin, D., Burke, J.A. et al. Named Data Networking Tech Report 001. University of California Los Angeles, CA, 2010. Retrieved Sept. 8, 2014; http://named-data.net/publications/techreports/tr001ndn-proj/Google ScholarGoogle Scholar

Index Terms

  1. Anticipating policy and social implications of named data networking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 59, Issue 12
      December 2016
      119 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3022085
      • Editor:
      • Moshe Y. Vardi
      Issue’s Table of Contents

      Copyright © 2016 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 December 2016

      Check for updates

      Qualifiers

      • review-article
      • Popular
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format