{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:23:51Z","timestamp":1772043831778,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,22]]},"DOI":"10.1145\/3405656.3420229","type":"proceedings-article","created":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T21:17:38Z","timestamp":1600809458000},"page":"155-157","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On economic, societal, and political aspects in ICN"],"prefix":"10.1145","author":[{"given":"Pouyan Fotouhi","family":"Tehrani","sequence":"first","affiliation":[{"name":"Weizenbaum Institute \/ Fraunhofer FOKUS"}]},{"given":"Jochen H.","family":"Schiller","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]}],"member":"320","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018589"},{"key":"e_1_3_2_2_2_1","first-page":"773","article-title":"A Network Theory of Power","volume":"5","author":"Castells Manuel","year":"2011","unstructured":"Manuel Castells . 2011 . A Network Theory of Power . International Journal of Communication 5 (2011), 773 -- 787 . Manuel Castells. 2011. A Network Theory of Power. International Journal of Communication 5 (2011), 773--787.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_2_3_1","volume-title":"TRIAD: A New Next-Generation Internet Architecture. Technical Report","author":"Cheriton David R","year":"2000","unstructured":"David R Cheriton and Mark Gritter . 2000 . TRIAD: A New Next-Generation Internet Architecture. Technical Report . Distributed Systems Group, Stanford University . David R Cheriton and Mark Gritter. 2000. TRIAD: A New Next-Generation Internet Architecture. Technical Report. Distributed Systems Group, Stanford University."},{"key":"e_1_3_2_2_4_1","volume-title":"ANDaNA: Anonymous Named Data Networking Application. CoRR abs\/1112.2205 (Dec","author":"DiBenedetto Steven","year":"2011","unstructured":"Steven DiBenedetto , Paolo Gasti , Gene Tsudik , and Ersin Uzun . 2011. ANDaNA: Anonymous Named Data Networking Application. CoRR abs\/1112.2205 (Dec . 2011 ), 18. arXiv:1112.2205 Steven DiBenedetto, Paolo Gasti, Gene Tsudik, and Ersin Uzun. 2011. ANDaNA: Anonymous Named Data Networking Application. CoRR abs\/1112.2205 (Dec. 2011), 18. arXiv:1112.2205"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.2.2012.0026"},{"key":"e_1_3_2_2_6_1","volume-title":"Polyzos","author":"Fotiou Nikos","year":"2014","unstructured":"Nikos Fotiou , Somaya Arianfar , Mikko S\u00e4rel\u00e4 , and George C . Polyzos . 2014 . A Framework for Privacy Analysis of ICN Architectures. In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Lecture Notes in Computer Science, Vol. 8450 . Springer International Publishing , Cham, Switzerland, 117--132. Nikos Fotiou, Somaya Arianfar, Mikko S\u00e4rel\u00e4, and George C. Polyzos. 2014. A Framework for Privacy Analysis of ICN Architectures. In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Lecture Notes in Computer Science, Vol. 8450. Springer International Publishing, Cham, Switzerland, 117--132."},{"key":"e_1_3_2_2_7_1","volume-title":"DoS and DDoS in Named Data Networking. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). IEEE Press, 1--7.","author":"Gasti Paolo","year":"2013","unstructured":"Paolo Gasti , Gene Tsudik , Ersin Uzun , and Lixia Zhang . 2013 . DoS and DDoS in Named Data Networking. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). IEEE Press, 1--7. Paolo Gasti, Gene Tsudik, Ersin Uzun, and Lixia Zhang. 2013. DoS and DDoS in Named Data Networking. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). IEEE Press, 1--7."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070563"},{"key":"e_1_3_2_2_10_1","volume-title":"IANA Report on the Delegation of the. KP Top-Level Domain. https:\/\/www.iana.org\/reports\/2007\/kp-report-11sep2007.html [Online","author":"Numbers Authority Internet Assigned","year":"2020","unstructured":"Internet Assigned Numbers Authority . 2007. IANA Report on the Delegation of the. KP Top-Level Domain. https:\/\/www.iana.org\/reports\/2007\/kp-report-11sep2007.html [Online ; accessed 05- July - 2020 ]. Internet Assigned Numbers Authority. 2007. IANA Report on the Delegation of the. KP Top-Level Domain. https:\/\/www.iana.org\/reports\/2007\/kp-report-11sep2007.html [Online; accessed 05-July-2020]."},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09)","author":"Jacobson Van","unstructured":"Van Jacobson , Diana K Smetters , James D Thornton , Michael F. Plass , Nicholas H. Briggs , and Rebecca L. Braynard . 2009. Networking named content . In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09) . ACM Press, New York, NY, USA, 1--12. Van Jacobson, Diana K Smetters, James D Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard. 2009. Networking named content. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09). ACM Press, New York, NY, USA, 1--12."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"e_1_3_2_2_13_1","unstructured":"Alexandros Kostopoulos Ioanna Papafili Costas Kalogiros Tapio Lev\u00e4 Nan Zhang and Dirk Trossen. 2012. A Tussle Analysis for Information-Centric Networking Architectures. In The Future Internet Federico \u00c1lvarez Frances Cleary Petros Daras John Domingue Alex Galis Ana Garcia Anastasius Gavras Stamatis Karnourskos Srdjan Krco Man-Sze Li Volkmar Lotz Henning M\u00fcller Elio Salvadori Anne-Marie Sassen Hans Schaffers Burkhard Stiller Georgios Tselentis Petra Turkama and Theodore Zahariadis (Eds.). Lecture Notes in Computer Science Vol. 7281. Springer Berlin Heidelberg Berlin Heidelberg 6--17.  Alexandros Kostopoulos Ioanna Papafili Costas Kalogiros Tapio Lev\u00e4 Nan Zhang and Dirk Trossen. 2012. A Tussle Analysis for Information-Centric Networking Architectures. In The Future Internet Federico \u00c1lvarez Frances Cleary Petros Daras John Domingue Alex Galis Ana Garcia Anastasius Gavras Stamatis Karnourskos Srdjan Krco Man-Sze Li Volkmar Lotz Henning M\u00fcller Elio Salvadori Anne-Marie Sassen Hans Schaffers Burkhard Stiller Georgios Tselentis Petra Turkama and Theodore Zahariadis (Eds.). Lecture Notes in Computer Science Vol. 7281. Springer Berlin Heidelberg Berlin Heidelberg 6--17."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378956.2378966"},{"key":"e_1_3_2_2_15_1","volume-title":"2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE Press, 1--6.","author":"Manandhar Kebina","year":"2014","unstructured":"Kebina Manandhar , Ben Adcock , and Xiaojun Cao . 2014 . Preserving the Anonymity in MobilittyFirst networks . In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE Press, 1--6. Kebina Manandhar, Ben Adcock, and Xiaojun Cao. 2014. Preserving the Anonymity in MobilittyFirst networks. In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE Press, 1--6."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175228"},{"key":"e_1_3_2_2_17_1","first-page":"3","article-title":"Securing trust online: Wisdom or oxymoron","volume":"81","author":"Nissenbaum H.","year":"2001","unstructured":"H. Nissenbaum . 2001 . Securing trust online: Wisdom or oxymoron ? Boston University Law Review 81 , 3 (June 2001), 635--664. H. Nissenbaum. 2001. Securing trust online: Wisdom or oxymoron? Boston University Law Review 81, 3 (June 2001), 635--664.","journal-title":"Boston University Law Review"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157986"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018596"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915915"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357401"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764878"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.009"}],"event":{"name":"ICN '20: 7th ACM Conference on Information-Centric Networking","location":"Virtual Event Canada","acronym":"ICN '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 7th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405656.3420229","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3405656.3420229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:09Z","timestamp":1750195929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405656.3420229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":23,"alternative-id":["10.1145\/3405656.3420229","10.1145\/3405656"],"URL":"https:\/\/doi.org\/10.1145\/3405656.3420229","relation":{},"subject":[],"published":{"date-parts":[[2020,9,22]]},"assertion":[{"value":"2020-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}