Northeastern University
College of Computer and Information Science

Contact Us

  • Contact Us

Search

  • Explore CCIS
    • About the College
      • Dean’s Message
    • Undergraduate Programs
      • Advising
      • Degree Programs
      • Minor in Computer Science
      • Minor in Information Science
      • Tutoring
      • Scholarships
      • Student Awards
    • Graduate Programs
      • Degree Programs
      • Current Students
    • Co-op
    • People and Organizations
      • Faculty
      • Administrative Staff
      • Student Organizations
    • Contact Us
    • Research
      • Research Groups
      • Centers and Institutes
    • Technical Help
  • Prospective Students
  • Current Students
  • Alumni
  • Employers
Layout Image
  • About the College
    • Dean’s Message
    • CCIS Videos
  • Undergraduate Programs
    • Advising
    • Degree Programs
    • Minor in Computer Science
    • Minor in Information Science
    • Scholarships
      • Bradley E. Bailey Scholarship
      • Darwin Scholarship
      • Jane K. Wenzinger Scholarship Fund
      • Department of Defense Information Assurance Scholarship Program
      • NSF Federal Cyber Service: Scholarship for Service
    • Student Awards and Research
    • Tutoring
  • Graduate Programs
    • Degree Programs
      • Ph.D. in Computer Science
        • Admission Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Electives Outside the College
        • Specimen Curriculum
        • Academic Review Process
      • Ph.D. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Specimen Curriculum
        • Program Faculty
        • Contact Us
      • Ph.D. in Personal Health Informatics
      • M.S. in Computer Science
        • Admissions Requirements
        • Academic Requirements
        • Academic Probation
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Specimen Academic Schedule
        • Reading and Project Courses
        • Master’s Thesis
        • Request More Information
      • M.S. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Specimen Academic Schedule
        • Financial Aid and Scholarships
        • Faculty
        • Request More Information- MSIA
      • M.S. in Health Informatics
        • Program Overview
        • Master’s Degree
        • Certificates
        • Course Descriptions
        • Testimonials
        • Faculty
        • Careers
        • Student Profiles
        • Apply
        • Request More Information- MSHI
      • ALIGN
    • Apply
    • Scholarships
    • FAQ
    • Current Students
      • Course Descriptions
      • Course Schedules
      • Graduate Guidebook
      • Commencement
      • Forms
      • Travel Support
      • Wiki
      • Jobs
      • New Student Page
        • MyNeu Account
        • Course Registration
        • Health Insurance Requirements
        • ISSI Orientation
        • CCIS Orientation
        • CCIS Email Account
        • Paying Your Bill
        • Husky ID Cards
        • Online Learning
        • Housing
        • Parking
        • Public Transportation
  • Research
    • Research Groups
      • Algorithms and Theory
      • Artificial Intelligence
      • Data
      • Educational Research
      • Formal Methods
      • Game Design
      • Network Science
      • Personal Health Informatics
      • Programming Languages
      • Security
      • Software Engineering
      • Systems
    • Centers and Institutes
  • Co-op
    • Information for Students
      • FAQ
      • Information for New Students
      • Information for Upperclass Students
      • Information for GraduateĀ Students
      • Prospective
      • Forms
    • Information for Employers
    • Co-op Manual
      • Steps to Finding A Job
      • Taking a Course
      • Academic Standards
    • Research & Data
      • Assessment
    • Calendar
    • Surveys & Evaluations
      • Student Evaluation
      • Employer Evaluation
  • People and Organizations
    • Faculty
    • Administrative Staff
    • Student Organizations
  • News & Events
    • News Archive
    • Events
    • Distinguished Speakers Series
Events Archive

Security and Privacy Challenges in Future Internet Architectures: the Case of Named Data Networking

  • Speaker:
    Guevara Noubir
  • Event Date:
    Thursday February 23rd, 2012
  • Time:
    11:00 AM
  • Location:
    366 WVH

Abstract

The Internet has been a huge success. In the 1970s, when core ideas underlying today's Internet were developed, telephony was the only example of effective global-scale communications. Thus, while the communication solution offered by the Internet's TCP/IP suite was unique and ground-breaking, the communication paradigm it focused on was similar to that of telephony: a point-to-point conversation between two entities. The world has changed dramatically since then and the Internet now has to accommodate information-intensive services, exabytes of content being created and consumed daily as well as a multitude of mobile devices being connected to it.

To keep pace with these changes and move the Internet into the future, research efforts to design new Internet architectures have taken off within the last few years. Named-Data Networking (NDN) is one such effort that exemplifies the content-centric approach to networking. Rather than naming locations (i.e., hosts or interfaces), NDN names content, which becomes first-class entity. This allows decoupling of content from the host that might store and/or disseminate it, facilitating automatic caching and optimizing bandwidth usage. Due to its new architecture, NDN introduces new security and privacy challenges. These challenges include data privacy, anonymity, access control and authentication. In this talks, I will review some of these challenges and provides insights into the current research.

Brief Biography

Paolo Gasti is a research scholar at the Information and Computer Science (ICS) department of University of California, Irvine. He received his Ph.D. in 2010 from University of Genoa, Italy where he worked on cryptography and security in distributed systems. In 2008 he was the recipient of a Fulbright scholarship that allowed him to spend part of his Ph.D. at the Johns Hopkins University in Baltimore, MD. His current research is focused on security in future Internet architecture, privacy-preserving sharing of sensitive information and secure multi-party protocols.

Northeastern University
  • My NEU
  • Find Faculty & Staff
  • Find A – Z
  • Emergency Information
  • Search

360 Huntington Ave. Boston, Massachusetts 02115 • 1 (617) 373-2000

© 2013 Northeastern University

  • twitter
  • facebook
  • youtube