Access Control and Privacy-Enhanced Technology in Next Generation Communication Networks
1Chinese Academy of Sciences, Beijing, China
2University of Science and Technology Beijing, Beijing, China
3University of Texas at Arlington, Arlington, USA
Access Control and Privacy-Enhanced Technology in Next Generation Communication Networks
Description
Next-generation communication networks (NGCMs) not only improve network speeds but also integrate perceptron and computing resources to create a new generation integrated service system. In the service system, the physical world can be sensed more delicately by high-quality sensors, computing resources can be allocated flexibly between edge nodes and servers, and data is exchanged across system boundaries. This new service model will not only make significant changes to data analysis, data process, and data service but also bring new applications and services. Through NCGMs, physical space and cyber-space are more tightly integrated than ever. As a consequence, data security and privacy in NGCNs are closely tied to users, businesses, and countries.
NGCNs encompass multiple heterogeneous networks and span terrestrial networks, space satellite networks, and marine networks. Through NGCNs, users can connect to the network and access precise data anywhere and anytime. As a result, it is very important to design highly flexible access control and privacy protection mechanisms to satisfy data exchange requirements in NGCNs.
This Special Issue aims to bring together recent advances on access control and privacy-enhanced technology in NGCNs. We encourage original and innovative perspectives on theories, methodologies, schemes, algorithms, and systems from academia, industry, and government. We welcome both original research and review articles.
Potential topics include but are not limited to the following:
- Access control model and mechanism in NGCM
- Usage control model and mechanism in NGCM
- Policy negotiation and verification in NGCM
- Distributed/non-distributed policy evaluation in NGCM
- Lightweight authentication mechanisms for NGCM
- Blockchain-based usage control in NGCM
- End-to-end communication privacy in NGCM
- Privacy-enhanced data collection, classification, and analytics in NGCM
- Incentive mechanisms of privacy management in NGCM
- Privacy of digital twins in NGCM