{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:08:27Z","timestamp":1767888507366,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,30]],"date-time":"2015-09-30T00:00:00Z","timestamp":1443571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1345318, 1345286"],"award-info":[{"award-number":["1345318, 1345286"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,30]]},"DOI":"10.1145\/2810156.2810170","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"177-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":130,"title":["Schematizing Trust in Named Data Networking"],"prefix":"10.1145","author":[{"given":"Yingdi","family":"Yu","sequence":"first","affiliation":[{"name":"UCLA, Los Angeles, CA, USA"}]},{"given":"Alexander","family":"Afanasyev","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, CA, USA"}]},{"given":"David","family":"Clark","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"CAIDA, San Diego, CA, USA"}]},{"given":"Van","family":"Jacobson","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, CA, USA"}]},{"given":"Lixia","family":"Zhang","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"e_1_3_2_1_2_1","volume-title":"DNS security introduction and requirements. RFC 4033","author":"Arends R.","year":"2005","unstructured":"R. Arends , R. Austein , M. Larson , D. Massey , and S. Rose . DNS security introduction and requirements. RFC 4033 , 2005 . R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. DNS security introduction and requirements. RFC 4033, 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393852"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/998684.1006922"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947361"},{"key":"e_1_3_2_1_6_1","author":"Clarke D.","year":"2001","unstructured":"D. Clarke , J.-E. Elien , C. Ellison , M. Fredette , A. Morcos , and R. L. Rivest . Certificate chain discovery in SPKI\/SDSI. Journal of Computer Security , 2001 . D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI\/SDSI. Journal of Computer Security, 2001.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/560991"},{"key":"e_1_3_2_1_8_1","volume-title":"Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280","author":"Cooper D.","year":"2008","unstructured":"D. Cooper , S. Santesson , S. Farrell , S. Boeyen , R. Housley , and W. Polk . Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280 , 2008 . D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"The transport layer security (TLS) protocol version 1.2. RFC 5246","author":"Dierks T.","year":"2008","unstructured":"T. Dierks and E. Rescorla . The transport layer security (TLS) protocol version 1.2. RFC 5246 , 2008 . T. Dierks and E. Rescorla. The transport layer security (TLS) protocol version 1.2. RFC 5246, 2008."},{"key":"e_1_3_2_1_10_1","volume-title":"Pearson Education","author":"Gamma E.","year":"1994","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design patterns: elements of reusable object-oriented software . Pearson Education , 1994 . E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Pearson Education, 1994."},{"key":"e_1_3_2_1_11_1","first-page":"6698","author":"Hoffman P.","year":"2012","unstructured":"P. Hoffman and J. Schlyter . The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA. RFC 6698 , 2012 . P. Hoffman and J. Schlyter. The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA. RFC 6698, 2012.","journal-title":"RFC"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884431"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of IEEE Symposium on Security and Privacy","author":"Li N.","year":"2002","unstructured":"N. Li , J. C. Mitchell , and W. H. Winsborough . Design of a role-based trust-management framework . In Proc. of IEEE Symposium on Security and Privacy , 2002 . N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust-management framework. In Proc. of IEEE Symposium on Security and Privacy, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502005"},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/named-data.net\/codebase\/platform\/","author":"Team NDN","year":"2015","unstructured":"NDN Team . Libraries \/ NDN platform. http:\/\/named-data.net\/codebase\/platform\/ , 2015 . NDN Team. Libraries \/ NDN platform. http:\/\/named-data.net\/codebase\/platform\/, 2015."},{"key":"e_1_3_2_1_16_1","unstructured":"NDN Team. NDN packet format specification. http:\/\/named-data.net\/doc\/ndn-tlv\/ 2015.  NDN Team. NDN packet format specification. http:\/\/named-data.net\/doc\/ndn-tlv\/ 2015."},{"key":"e_1_3_2_1_17_1","unstructured":"NDN Team. NDN regular expression. http:\/\/named-data.net\/doc\/ndn-cxx\/current\/tutorials\/utils-ndn-regex.html 2015.  NDN Team. NDN regular expression. http:\/\/named-data.net\/doc\/ndn-cxx\/current\/tutorials\/utils-ndn-regex.html 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"PARC","author":"Smetters D.","year":"2009","unstructured":"D. Smetters and V. Jacobson . Securing network content. Technical report , PARC , 2009 . D. Smetters and V. Jacobson. Securing network content. Technical report, PARC, 2009."},{"key":"e_1_3_2_1_19_1","volume-title":"NDN","author":"Yu Y.","year":"2015","unstructured":"Y. Yu . Public key management in Named Data Networking. Tech. Rep. NDN-0029 , NDN , 2015 . Y. Yu. Public key management in Named Data Networking. Tech. Rep. NDN-0029, NDN, 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"}],"event":{"name":"ICN'15: 2nd International Conference on Information-Centric Networking","location":"San Francisco California USA","acronym":"ICN'15","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2nd ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810156.2810170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810156.2810170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:32Z","timestamp":1750225712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810156.2810170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,30]]},"references-count":20,"alternative-id":["10.1145\/2810156.2810170","10.1145\/2810156"],"URL":"https:\/\/doi.org\/10.1145\/2810156.2810170","relation":{},"subject":[],"published":{"date-parts":[[2015,9,30]]},"assertion":[{"value":"2015-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}