{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:32Z","timestamp":1775199512598,"version":"3.50.1"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:p>Considering the social impact of a proposed future Internet architecture.<\/jats:p>","DOI":"10.1145\/2915915","type":"journal-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T19:13:10Z","timestamp":1480619590000},"page":"92-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Anticipating policy and social implications of named data networking"],"prefix":"10.1145","volume":"59","author":[{"given":"Katie","family":"Shilton","sequence":"first","affiliation":[{"name":"University of Maryland, College Park"}]},{"given":"Jeffrey A.","family":"Burke","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles"}]},{"given":"KC","family":"Claffy","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Lixia","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles"}]}],"member":"320","published-online":{"date-parts":[[2016,12]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"IFIP Networking Conference","author":"Afanasyev A.","year":"2013","unstructured":"Afanasyev , A. , Mahadevan , P. , Moiseenko , I. , Uzun , E. and Zhang , L . Interest flooding attack and countermeasures in Named Data Networking . IFIP Networking Conference , 2013 , 1--9. Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E. and Zhang, L. Interest flooding attack and countermeasures in Named Data Networking. IFIP Networking Conference, 2013, 1--9."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384447"},{"key":"e_1_2_1_3_1","volume-title":"UCLA","author":"Bannis A.","year":"2015","unstructured":"Bannis , A. and Burke , J.A . Creating a secure, integrated home network of things with Named Data Networking . UCLA , 2015 , Los Angeles, CA. Bannis, A. and Burke, J.A. Creating a secure, integrated home network of things with Named Data Networking. UCLA, 2015, Los Angeles, CA."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.07.003"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811398031"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240701575684"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818216"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of IEEE INFOCOMM 2013 NOMEN Workshop. Retrieved Aug.7","author":"Burke J.A.","unstructured":"Burke , J.A. , Gasti , P. , Nathan , N. and Tsudik , G . Securing instrumented environments over content-centric networking: the case of lighting control . In Proceedings of IEEE INFOCOMM 2013 NOMEN Workshop. Retrieved Aug.7 , 2015; http:\/\/named-data.net\/publications\/nomen13\/ Burke, J.A., Gasti, P., Nathan, N. and Tsudik, G. Securing instrumented environments over content-centric networking: the case of lighting control. In Proceedings of IEEE INFOCOMM 2013 NOMEN Workshop. Retrieved Aug.7, 2015; http:\/\/named-data.net\/publications\/nomen13\/"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500102"},{"key":"e_1_2_1_10_1","volume-title":"The offensive internet: privacy, speech, and reputation","author":"Citron D.K.","year":"2010","unstructured":"Citron , D.K. Civil rights in our information age . In The offensive internet: privacy, speech, and reputation . Harvard University Press , Cambridge, MA and London, 2010 , 31--49. Citron, D.K. Civil rights in our information age. In The offensive internet: privacy, speech, and reputation. Harvard University Press, Cambridge, MA and London, 2010, 31--49."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 42nd Research Conference on Communication, Information, and Internet Policy. Social Science Research Network, 2014","author":"Clark D.D.","year":"2015","unstructured":"Clark , D.D. , Bauer , S. , Lehr , W. et al. Measurement and analysis of Internet interconnection and congestion . In Proceedings of the 42nd Research Conference on Communication, Information, and Internet Policy. Social Science Research Network, 2014 . Retrieved Aug. 17, 2015 ; http:\/\/papers.ssrn.com.proxy-um.researchport.umd.edu\/abstract=2417573 Clark, D.D., Bauer, S., Lehr, W. et al. Measurement and analysis of Internet interconnection and congestion. In Proceedings of the 42nd Research Conference on Communication, Information, and Internet Policy. Social Science Research Network, 2014. Retrieved Aug. 17, 2015; http:\/\/papers.ssrn.com.proxy-um.researchport.umd.edu\/abstract=2417573"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633059"},{"key":"e_1_2_1_13_1","first-page":"981","article-title":"A right to read anonymously: A closer look at \"copyright management\" in cyberspace","volume":"28","author":"Cohen J.E","year":"1996","unstructured":"Cohen , J.E . A right to read anonymously: A closer look at \"copyright management\" in cyberspace . Connecticut Law Review 28 ( 1996 ), 981 -- 1039 . Cohen, J.E. A right to read anonymously: A closer look at \"copyright management\" in cyberspace. Connecticut Law Review 28 (1996), 981--1039.","journal-title":"Connecticut Law Review"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks, 630--638","author":"Compagno A.","unstructured":"Compagno , A. Conti , M. , Gasti , P. and Tsudik , G . Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking . In Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks, 630--638 . Compagno, A. Conti, M., Gasti, P. and Tsudik, G. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. In Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks, 630--638."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506072163"},{"key":"e_1_2_1_16_1","first-page":"5","article-title":"Hidden levers of internet control. Information","volume":"15","author":"DeNardis L","year":"2012","unstructured":"DeNardis . L . Hidden levers of internet control. Information , Communication & Society 15 , 5 ( 2012 ), 720--738 DeNardis. L. Hidden levers of internet control. Information, Communication & Society 15, 5 (2012), 720--738","journal-title":"Communication & Society"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium, Internet Society. Retrieved","author":"DiBenedetto S.","unstructured":"DiBenedetto , S. , Gasti , P. , Tsudik , G. and Uzun , E . ANDaNA: Anonymous Named Data Networking application . In Proceedings of the 19th Annual Network & Distributed System Security Symposium, Internet Society. Retrieved June 26, 2012; http:\/\/arxiv.org\/abs\/1112.2205 DiBenedetto, S., Gasti, P., Tsudik, G. and Uzun, E. ANDaNA: Anonymous Named Data Networking application. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, Internet Society. Retrieved June 26, 2012; http:\/\/arxiv.org\/abs\/1112.2205"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2772722.2772740"},{"key":"e_1_2_1_19_1","volume-title":"Wired Shut: Copyright and the Shape of Digital Culture","author":"Gillespie T.","year":"2009","unstructured":"Gillespie , T. Wired Shut: Copyright and the Shape of Digital Culture . The MIT Press , 2009 . Gillespie, T. Wired Shut: Copyright and the Shape of Digital Culture. The MIT Press, 2009."},{"key":"e_1_2_1_20_1","unstructured":"Google transparency report. 2005. Retrieved Aug. 17 2015; http:\/\/www.google.com\/transparencyreport\/removals\/copyright\/  Google transparency report. 2005. Retrieved Aug. 17 2015; http:\/\/www.google.com\/transparencyreport\/removals\/copyright\/"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063204"},{"key":"e_1_2_1_22_1","volume-title":"Code: Version 2.0","author":"Lessig L.","year":"2006","unstructured":"Lessig , L. Code: Version 2.0 . Basic Books , New York, NY , 2006 . Lessig, L. Code: Version 2.0. Basic Books, New York, NY, 2006."},{"key":"e_1_2_1_23_1","volume-title":"Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing","author":"Mayer-Schoenberger V.","year":"2007","unstructured":"Mayer-Schoenberger , V. Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing . Harvard University , Cambridge, MA , 2007 . Mayer-Schoenberger, V. Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing. Harvard University, Cambridge, MA, 2007."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/016224399201700302"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1215\/01642472-23-2_83-95"},{"key":"e_1_2_1_26_1","first-page":"3","article-title":"The perils of social reading","volume":"101","author":"Richards N.M","year":"2013","unstructured":"Richards , N.M . The perils of social reading . Georgetown Law Journal 101 , 3 ( 2013 ). Retrieved Apr. 15, 2012; http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2031307 Richards, N.M. The perils of social reading. Georgetown Law Journal 101, 3 (2013). Retrieved Apr. 15, 2012; http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2031307","journal-title":"Georgetown Law Journal"},{"key":"e_1_2_1_27_1","first-page":"88","article-title":"The right to be forgotten","volume":"64","author":"Rosen J","year":"2012","unstructured":"Rosen , J . The right to be forgotten . Stanford Law Review Online 64 ( 2012 ), 88 . Rosen, J. The right to be forgotten. Stanford Law Review Online 64 (2012), 88.","journal-title":"Stanford Law Review Online"},{"key":"e_1_2_1_28_1","first-page":"3","article-title":"Securing building management systems using named data networking","volume":"28","author":"Shang W.","year":"2014","unstructured":"Shang , W. , Ding , Q. , Marianantoni , A. , Burke , J. and Zhang , L . Securing building management systems using named data networking . IEEE Network 28 , 3 ( 2014 ), 50--56. Shang, W., Ding, Q., Marianantoni, A., Burke, J. and Zhang, L. Securing building management systems using named data networking. IEEE Network 28, 3 (2014), 50--56.","journal-title":"IEEE Network"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810170"},{"key":"e_1_2_1_30_1","volume-title":"Name-based access control","author":"Yu Y.","year":"2015","unstructured":"Yu , Y. , Afanasyev , A. and Zhang , L . Name-based access control . University of California Los Angeles , CA, 2015 . Yu, Y., Afanasyev, A. and Zhang, L. Name-based access control. University of California Los Angeles, CA, 2015."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2915915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2915915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:18Z","timestamp":1750222578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2915915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":30,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1145\/2915915"],"URL":"https:\/\/doi.org\/10.1145\/2915915","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12]]},"assertion":[{"value":"2016-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}