{"id":1054,"date":"2012-05-26T15:25:14","date_gmt":"2012-05-26T07:25:14","guid":{"rendered":"http:\/\/www.icnalb.cn\/?p=1054"},"modified":"2012-05-26T15:25:14","modified_gmt":"2012-05-26T07:25:14","slug":"identity-in-an-information-centric-internet","status":"publish","type":"post","link":"https:\/\/www.icnlab.cn\/?p=1054","title":{"rendered":"Identity in an Information-centric Internet"},"content":{"rendered":"<p>\u6807\u9898\uff1aIdentity\u00a0in\u00a0an\u00a0Information-centric\u00a0Internet\u00a0<\/p>\n<p style=\"padding-left: 30px;\">(\u00a0<span style=\"font-family: \u5b8b\u4f53;\">\u6765\u6e90<\/span><span style=\"font-family: Arial;\">URL<\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff1a<\/span><span style=\"font-family: Arial;\"><a href=\"http:\/\/cfp.mit.edu\/groups\/privacy-security.shtml \" target=\"_blank\">http:\/\/cfp.mit.edu\/groups\/privacy-security.shtml\u00a0<\/a>)<\/span><\/p>\n<p>\u7b80\u8981\u8bf4\u660e\uff1a\u00a0MIT\u00a0CFP\u00a0Privacy\u00a0and\u00a0Security\u00a0Working\u00a0Group,\u00a0April\u00a02008.<\/p>\n<p>\u6587\u6863\u65e5\u671f\uff1a2008<span style=\"font-family: \u5b8b\u4f53;\">\u5e74<\/span><span style=\"font-family: Arial;\">4<\/span><span style=\"font-family: \u5b8b\u4f53;\">\u6708\uff08\u00a0<\/span><span style=\"font-family: Arial;\">April,\u00a02008.<\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/p>\n<p>\u4f5c\u8005\u4fe1\u606f\uff1aA white paper prepared by the Privacy &amp; Security Working Group within the MIT Communications<\/p>\n<p style=\"padding-left: 60px;\">Futures Program ( CFP ). Participating CFP Companies: BT, Comcast, Motorola, Intel, Nokia Siemens<\/p>\n<p style=\"padding-left: 60px;\">Network, Cisco.<\/p>\n<p>\u00a0\u9644\u4ef6\uff1a<a href=\"https:\/\/www.icnalb.cn\/wordpress\/wp-content\/uploads\/2012\/05\/Identity-in-an-Information-centric-Internet.pdf\">Identity in an Information-centric Internet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6807\u9898\uff1aIdentity\u00a0in\u00a0an\u00a0Information-centric\u00a0Internet\u00a0 (\u00a0\u6765\u6e90URL [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/1054"}],"collection":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1054"}],"version-history":[{"count":1,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/1054\/revisions"}],"predecessor-version":[{"id":1056,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=\/wp\/v2\/posts\/1054\/revisions\/1056"}],"wp:attachment":[{"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icnlab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}