Co-Governed Sovereignty Network : : Legal Basis and Its Prototype and Applications with MIN Architecture.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Singapore : : Springer Singapore Pte. Limited,, 2021. Ã2021. |
Year of Publication: | 2021 |
Edition: | 1st ed. |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (284 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5006684530 |
---|---|
ctrlnum |
(MiAaPQ)5006684530 (Au-PeEL)EBL6684530 (OCoLC)1262726674 |
collection |
bib_alma |
record_format |
marc |
spelling |
Li, Hui. Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. 1st ed. Singapore : Springer Singapore Pte. Limited, 2021. Ã2021. 1 online resource (284 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Intro -- Foreword I: From IP to MIN by Prof. Weimin Zheng -- Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li -- Preface -- Acknowledgements -- Contents -- About the Authors -- 1 Sovereignty and Network Sovereignty -- 1.1 Historical Background -- 1.1.1 Origin of Traditional Sovereignty -- 1.1.2 Traditional Sovereignty -- 1.1.3 Mission of Sovereignty -- 1.2 Adaptability of Sovereignty in Cyberspace -- 1.2.1 Composition of Cyberspace -- 1.2.2 Network Sovereignty in the New Era -- 1.3 Exploration of Network Sovereignty -- 1.3.1 Theoretical Contend -- 1.3.2 Exploration and Practice -- 1.4 Overview of Network Sovereignty -- 1.4.1 Legal Connotation of Network Sovereignty -- 1.4.2 Layers of Network Sovereignty -- 1.4.3 Role of Network Sovereignty in Each Stage -- 1.5 Necessity of Advocating Network Sovereignty -- 1.5.1 Necessity of Dividing Information Sovereignty -- 1.5.2 Necessity of Network Territory -- 1.5.3 Necessity of Making Rules Under the Law -- References -- 2 Interpretation of Network Sovereignty -- 2.1 International Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber Warfare -- 2.2.2 Governance of Network Sovereignty -- 2.2.3 Strategic Layout of Some States -- 2.3 Safeguarding Network Sovereignty -- 2.3.1 Strengthen the Awareness of National Network Sovereignty -- 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace -- 2.3.3 Peace and Stability in Cyberspace -- 2.3.4 Expanding the Network Sovereignty Concept -- 2.4 Current Situation of the Sovereignty of Broadcasting TV Network -- 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty -- 2.5.1 United States Presidential Election and the Storming of the United States Capitol -- 2.5.2 Social Media Platforms Banned Trump's Accounts -- 2.5.3 Regulating the Power of Social Media Platform. References -- 3 Architecture of Sovereignty Network -- 3.1 Sovereignty Network -- 3.1.1 Definition of Sovereignty Network -- 3.1.2 Functional Requirements for Sovereignty Network -- 3.2 Existing Technologies -- 3.2.1 IPv9 -- 3.2.2 New IP -- 3.3 Architecture of Sovereignty Network -- 3.3.1 Framework -- 3.3.2 Multi-identifier System -- 3.3.3 Multi-identifier Router -- 3.3.4 Security Situation Awareness System -- 3.4 Processes in Sovereignty Network -- 3.4.1 Registration Process -- 3.4.2 Publishing Content by Ordinary Users -- 3.4.3 Publishing Content by Broadcast Network Staffs -- 3.4.4 Obtaining Content by Ordinary Users -- 3.4.5 Obtaining Content by Broadcast Network Staffs -- 3.4.6 Assessing to Sovereignty Data by Extranet Users -- 3.4.7 Signature Algorithm in MIN -- 3.5 Assessing the Security of Sovereignty Network -- 3.5.1 Anti-attacking Analysis -- 3.5.2 Security Mechanisms -- 3.6 Protocol Architecture of Sovereignty Network -- References -- 4 Key Technologies of Sovereignty Network -- 4.1 Identity Centric Network -- 4.1.1 MIN Based on Identity Centric Network -- 4.1.2 Data Transmission Scheme -- 4.1.3 Process of User Access -- 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology -- 4.2.1 PoV Consensus Algorithm -- 4.2.2 PoV Consensus Process -- 4.2.3 PoV Hierarchical Signature Mechanism -- 4.3 Routing Scheme for Billions of Multiple Identifiers -- 4.3.1 Border Gateway Protocol -- 4.3.2 Hyperbolic Identifier and Routing Scheme -- 4.3.3 Hash Table with Prefix Tree Algorithm (HPT) -- 4.4 Identity Authentication Scheme Based on Real Identity and Biometric -- 4.4.1 Introduction of User Biological Characteristics -- 4.4.2 Introduction of Each Module -- 4.4.3 Application Scenarios -- 4.5 Privacy Protection and Network Management -- 4.5.1 Electronic Visas of Sovereignty Network -- 4.5.2 Asymmetric Encryptions. 4.5.3 Privacy Preserving Policy -- 4.6 Security Situation Awareness System -- 4.6.1 Innovative Points -- 4.6.2 Technical Terms -- 4.6.3 Application Scenarios -- 4.6.4 System Architecture -- 4.7 Security Analysis -- 4.7.1 Security Mechanisms -- 4.7.2 Security Mechanism of Network Architecture -- 4.7.3 Security Mechanism of Network Links -- 4.7.4 Security Mechanism of Core Components -- 4.7.5 Security Gain Brought by Sovereignty Network -- 4.7.6 Conclusion -- 4.8 Transmission Control -- 4.8.1 MIT Design -- 4.8.2 Active Congestion Detection -- 4.8.3 Explicit Congestion Notification -- 4.8.4 Hop-by-Hop Rate Shaping -- 4.8.5 Client Rate Adjustment -- 4.9 Addressing Model for Space-Terrestrial Integrated Networks -- 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks -- 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks -- 4.10 Identifier Extension Technology -- 4.10.1 Basic Formats for Network Packet -- 4.10.2 Identifiers Binding in MIS -- 4.10.3 Identifier Extension Mechanism -- 4.10.4 Procedure of the Packet Processing -- References -- 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN -- 5.1 Experiments of the Prototype System -- 5.1.1 User Registration and Resource Publishing -- 5.1.2 Accessing to IP Internal Network Resource -- 5.1.3 Accessing to External IP Resources -- 5.1.4 Certification Between Sovereignty Networks -- 5.1.5 Data Filtering Function of EMIR -- 5.1.6 E-Mail Transmission in Sovereignty Network -- 5.1.7 Voting Through Blockchain -- 5.2 MIN-Security Reliable Private Network -- 5.2.1 MIN-SRPN -- 5.2.2 Water Utilities System Based on MIN-SRPN -- 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN -- 5.3 MIN Adopted in the Industrial Internet -- 5.3.1 National Industrial Internet Identifier Resolution System with MIN. 5.3.2 National Industrial Internet with MIN -- 5.3.3 Inter-translation of Multiple Network Identifiers -- 5.3.4 Identifier Resolution in Automotive Industrial Internet -- 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy -- 5.4.1 Network Topology -- 5.4.2 Network Communications -- 5.4.3 An Example of the Multinational Interconnected Public Network -- 5.4.4 The United Nations of Cyberspace -- 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network -- 5.5.1 Current Work Basis -- 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN -- 5.5.3 5G Business -- 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G -- 5.5.5 Experiment and Evaluation of ST-MIN -- References. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Yang, Xin. Print version: Li, Hui Co-Governed Sovereignty Network Singapore : Springer Singapore Pte. Limited,c2021 9789811626692 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6684530 Click to View |
language |
English |
format |
eBook |
author |
Li, Hui. |
spellingShingle |
Li, Hui. Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. Intro -- Foreword I: From IP to MIN by Prof. Weimin Zheng -- Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li -- Preface -- Acknowledgements -- Contents -- About the Authors -- 1 Sovereignty and Network Sovereignty -- 1.1 Historical Background -- 1.1.1 Origin of Traditional Sovereignty -- 1.1.2 Traditional Sovereignty -- 1.1.3 Mission of Sovereignty -- 1.2 Adaptability of Sovereignty in Cyberspace -- 1.2.1 Composition of Cyberspace -- 1.2.2 Network Sovereignty in the New Era -- 1.3 Exploration of Network Sovereignty -- 1.3.1 Theoretical Contend -- 1.3.2 Exploration and Practice -- 1.4 Overview of Network Sovereignty -- 1.4.1 Legal Connotation of Network Sovereignty -- 1.4.2 Layers of Network Sovereignty -- 1.4.3 Role of Network Sovereignty in Each Stage -- 1.5 Necessity of Advocating Network Sovereignty -- 1.5.1 Necessity of Dividing Information Sovereignty -- 1.5.2 Necessity of Network Territory -- 1.5.3 Necessity of Making Rules Under the Law -- References -- 2 Interpretation of Network Sovereignty -- 2.1 International Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber Warfare -- 2.2.2 Governance of Network Sovereignty -- 2.2.3 Strategic Layout of Some States -- 2.3 Safeguarding Network Sovereignty -- 2.3.1 Strengthen the Awareness of National Network Sovereignty -- 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace -- 2.3.3 Peace and Stability in Cyberspace -- 2.3.4 Expanding the Network Sovereignty Concept -- 2.4 Current Situation of the Sovereignty of Broadcasting TV Network -- 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty -- 2.5.1 United States Presidential Election and the Storming of the United States Capitol -- 2.5.2 Social Media Platforms Banned Trump's Accounts -- 2.5.3 Regulating the Power of Social Media Platform. References -- 3 Architecture of Sovereignty Network -- 3.1 Sovereignty Network -- 3.1.1 Definition of Sovereignty Network -- 3.1.2 Functional Requirements for Sovereignty Network -- 3.2 Existing Technologies -- 3.2.1 IPv9 -- 3.2.2 New IP -- 3.3 Architecture of Sovereignty Network -- 3.3.1 Framework -- 3.3.2 Multi-identifier System -- 3.3.3 Multi-identifier Router -- 3.3.4 Security Situation Awareness System -- 3.4 Processes in Sovereignty Network -- 3.4.1 Registration Process -- 3.4.2 Publishing Content by Ordinary Users -- 3.4.3 Publishing Content by Broadcast Network Staffs -- 3.4.4 Obtaining Content by Ordinary Users -- 3.4.5 Obtaining Content by Broadcast Network Staffs -- 3.4.6 Assessing to Sovereignty Data by Extranet Users -- 3.4.7 Signature Algorithm in MIN -- 3.5 Assessing the Security of Sovereignty Network -- 3.5.1 Anti-attacking Analysis -- 3.5.2 Security Mechanisms -- 3.6 Protocol Architecture of Sovereignty Network -- References -- 4 Key Technologies of Sovereignty Network -- 4.1 Identity Centric Network -- 4.1.1 MIN Based on Identity Centric Network -- 4.1.2 Data Transmission Scheme -- 4.1.3 Process of User Access -- 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology -- 4.2.1 PoV Consensus Algorithm -- 4.2.2 PoV Consensus Process -- 4.2.3 PoV Hierarchical Signature Mechanism -- 4.3 Routing Scheme for Billions of Multiple Identifiers -- 4.3.1 Border Gateway Protocol -- 4.3.2 Hyperbolic Identifier and Routing Scheme -- 4.3.3 Hash Table with Prefix Tree Algorithm (HPT) -- 4.4 Identity Authentication Scheme Based on Real Identity and Biometric -- 4.4.1 Introduction of User Biological Characteristics -- 4.4.2 Introduction of Each Module -- 4.4.3 Application Scenarios -- 4.5 Privacy Protection and Network Management -- 4.5.1 Electronic Visas of Sovereignty Network -- 4.5.2 Asymmetric Encryptions. 4.5.3 Privacy Preserving Policy -- 4.6 Security Situation Awareness System -- 4.6.1 Innovative Points -- 4.6.2 Technical Terms -- 4.6.3 Application Scenarios -- 4.6.4 System Architecture -- 4.7 Security Analysis -- 4.7.1 Security Mechanisms -- 4.7.2 Security Mechanism of Network Architecture -- 4.7.3 Security Mechanism of Network Links -- 4.7.4 Security Mechanism of Core Components -- 4.7.5 Security Gain Brought by Sovereignty Network -- 4.7.6 Conclusion -- 4.8 Transmission Control -- 4.8.1 MIT Design -- 4.8.2 Active Congestion Detection -- 4.8.3 Explicit Congestion Notification -- 4.8.4 Hop-by-Hop Rate Shaping -- 4.8.5 Client Rate Adjustment -- 4.9 Addressing Model for Space-Terrestrial Integrated Networks -- 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks -- 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks -- 4.10 Identifier Extension Technology -- 4.10.1 Basic Formats for Network Packet -- 4.10.2 Identifiers Binding in MIS -- 4.10.3 Identifier Extension Mechanism -- 4.10.4 Procedure of the Packet Processing -- References -- 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN -- 5.1 Experiments of the Prototype System -- 5.1.1 User Registration and Resource Publishing -- 5.1.2 Accessing to IP Internal Network Resource -- 5.1.3 Accessing to External IP Resources -- 5.1.4 Certification Between Sovereignty Networks -- 5.1.5 Data Filtering Function of EMIR -- 5.1.6 E-Mail Transmission in Sovereignty Network -- 5.1.7 Voting Through Blockchain -- 5.2 MIN-Security Reliable Private Network -- 5.2.1 MIN-SRPN -- 5.2.2 Water Utilities System Based on MIN-SRPN -- 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN -- 5.3 MIN Adopted in the Industrial Internet -- 5.3.1 National Industrial Internet Identifier Resolution System with MIN. 5.3.2 National Industrial Internet with MIN -- 5.3.3 Inter-translation of Multiple Network Identifiers -- 5.3.4 Identifier Resolution in Automotive Industrial Internet -- 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy -- 5.4.1 Network Topology -- 5.4.2 Network Communications -- 5.4.3 An Example of the Multinational Interconnected Public Network -- 5.4.4 The United Nations of Cyberspace -- 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network -- 5.5.1 Current Work Basis -- 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN -- 5.5.3 5G Business -- 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G -- 5.5.5 Experiment and Evaluation of ST-MIN -- References. |
author_facet |
Li, Hui. Yang, Xin. |
author_variant |
h l hl |
author2 |
Yang, Xin. |
author2_variant |
x y xy |
author2_role |
TeilnehmendeR |
author_sort |
Li, Hui. |
title |
Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. |
title_sub |
Legal Basis and Its Prototype and Applications with MIN Architecture. |
title_full |
Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. |
title_fullStr |
Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. |
title_full_unstemmed |
Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. |
title_auth |
Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. |
title_new |
Co-Governed Sovereignty Network : |
title_sort |
co-governed sovereignty network : legal basis and its prototype and applications with min architecture. |
publisher |
Springer Singapore Pte. Limited, |
publishDate |
2021 |
physical |
1 online resource (284 pages) |
edition |
1st ed. |
contents |
Intro -- Foreword I: From IP to MIN by Prof. Weimin Zheng -- Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li -- Preface -- Acknowledgements -- Contents -- About the Authors -- 1 Sovereignty and Network Sovereignty -- 1.1 Historical Background -- 1.1.1 Origin of Traditional Sovereignty -- 1.1.2 Traditional Sovereignty -- 1.1.3 Mission of Sovereignty -- 1.2 Adaptability of Sovereignty in Cyberspace -- 1.2.1 Composition of Cyberspace -- 1.2.2 Network Sovereignty in the New Era -- 1.3 Exploration of Network Sovereignty -- 1.3.1 Theoretical Contend -- 1.3.2 Exploration and Practice -- 1.4 Overview of Network Sovereignty -- 1.4.1 Legal Connotation of Network Sovereignty -- 1.4.2 Layers of Network Sovereignty -- 1.4.3 Role of Network Sovereignty in Each Stage -- 1.5 Necessity of Advocating Network Sovereignty -- 1.5.1 Necessity of Dividing Information Sovereignty -- 1.5.2 Necessity of Network Territory -- 1.5.3 Necessity of Making Rules Under the Law -- References -- 2 Interpretation of Network Sovereignty -- 2.1 International Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber Warfare -- 2.2.2 Governance of Network Sovereignty -- 2.2.3 Strategic Layout of Some States -- 2.3 Safeguarding Network Sovereignty -- 2.3.1 Strengthen the Awareness of National Network Sovereignty -- 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace -- 2.3.3 Peace and Stability in Cyberspace -- 2.3.4 Expanding the Network Sovereignty Concept -- 2.4 Current Situation of the Sovereignty of Broadcasting TV Network -- 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty -- 2.5.1 United States Presidential Election and the Storming of the United States Capitol -- 2.5.2 Social Media Platforms Banned Trump's Accounts -- 2.5.3 Regulating the Power of Social Media Platform. References -- 3 Architecture of Sovereignty Network -- 3.1 Sovereignty Network -- 3.1.1 Definition of Sovereignty Network -- 3.1.2 Functional Requirements for Sovereignty Network -- 3.2 Existing Technologies -- 3.2.1 IPv9 -- 3.2.2 New IP -- 3.3 Architecture of Sovereignty Network -- 3.3.1 Framework -- 3.3.2 Multi-identifier System -- 3.3.3 Multi-identifier Router -- 3.3.4 Security Situation Awareness System -- 3.4 Processes in Sovereignty Network -- 3.4.1 Registration Process -- 3.4.2 Publishing Content by Ordinary Users -- 3.4.3 Publishing Content by Broadcast Network Staffs -- 3.4.4 Obtaining Content by Ordinary Users -- 3.4.5 Obtaining Content by Broadcast Network Staffs -- 3.4.6 Assessing to Sovereignty Data by Extranet Users -- 3.4.7 Signature Algorithm in MIN -- 3.5 Assessing the Security of Sovereignty Network -- 3.5.1 Anti-attacking Analysis -- 3.5.2 Security Mechanisms -- 3.6 Protocol Architecture of Sovereignty Network -- References -- 4 Key Technologies of Sovereignty Network -- 4.1 Identity Centric Network -- 4.1.1 MIN Based on Identity Centric Network -- 4.1.2 Data Transmission Scheme -- 4.1.3 Process of User Access -- 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology -- 4.2.1 PoV Consensus Algorithm -- 4.2.2 PoV Consensus Process -- 4.2.3 PoV Hierarchical Signature Mechanism -- 4.3 Routing Scheme for Billions of Multiple Identifiers -- 4.3.1 Border Gateway Protocol -- 4.3.2 Hyperbolic Identifier and Routing Scheme -- 4.3.3 Hash Table with Prefix Tree Algorithm (HPT) -- 4.4 Identity Authentication Scheme Based on Real Identity and Biometric -- 4.4.1 Introduction of User Biological Characteristics -- 4.4.2 Introduction of Each Module -- 4.4.3 Application Scenarios -- 4.5 Privacy Protection and Network Management -- 4.5.1 Electronic Visas of Sovereignty Network -- 4.5.2 Asymmetric Encryptions. 4.5.3 Privacy Preserving Policy -- 4.6 Security Situation Awareness System -- 4.6.1 Innovative Points -- 4.6.2 Technical Terms -- 4.6.3 Application Scenarios -- 4.6.4 System Architecture -- 4.7 Security Analysis -- 4.7.1 Security Mechanisms -- 4.7.2 Security Mechanism of Network Architecture -- 4.7.3 Security Mechanism of Network Links -- 4.7.4 Security Mechanism of Core Components -- 4.7.5 Security Gain Brought by Sovereignty Network -- 4.7.6 Conclusion -- 4.8 Transmission Control -- 4.8.1 MIT Design -- 4.8.2 Active Congestion Detection -- 4.8.3 Explicit Congestion Notification -- 4.8.4 Hop-by-Hop Rate Shaping -- 4.8.5 Client Rate Adjustment -- 4.9 Addressing Model for Space-Terrestrial Integrated Networks -- 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks -- 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks -- 4.10 Identifier Extension Technology -- 4.10.1 Basic Formats for Network Packet -- 4.10.2 Identifiers Binding in MIS -- 4.10.3 Identifier Extension Mechanism -- 4.10.4 Procedure of the Packet Processing -- References -- 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN -- 5.1 Experiments of the Prototype System -- 5.1.1 User Registration and Resource Publishing -- 5.1.2 Accessing to IP Internal Network Resource -- 5.1.3 Accessing to External IP Resources -- 5.1.4 Certification Between Sovereignty Networks -- 5.1.5 Data Filtering Function of EMIR -- 5.1.6 E-Mail Transmission in Sovereignty Network -- 5.1.7 Voting Through Blockchain -- 5.2 MIN-Security Reliable Private Network -- 5.2.1 MIN-SRPN -- 5.2.2 Water Utilities System Based on MIN-SRPN -- 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN -- 5.3 MIN Adopted in the Industrial Internet -- 5.3.1 National Industrial Internet Identifier Resolution System with MIN. 5.3.2 National Industrial Internet with MIN -- 5.3.3 Inter-translation of Multiple Network Identifiers -- 5.3.4 Identifier Resolution in Automotive Industrial Internet -- 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy -- 5.4.1 Network Topology -- 5.4.2 Network Communications -- 5.4.3 An Example of the Multinational Interconnected Public Network -- 5.4.4 The United Nations of Cyberspace -- 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network -- 5.5.1 Current Work Basis -- 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN -- 5.5.3 5G Business -- 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G -- 5.5.5 Experiment and Evaluation of ST-MIN -- References. |
isbn |
9789811626708 9789811626692 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.5 45105.9 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6684530 |
illustrated |
Not Illustrated |
oclc_num |
1262726674 |
work_keys_str_mv |
AT lihui cogovernedsovereigntynetworklegalbasisanditsprototypeandapplicationswithminarchitecture AT yangxin cogovernedsovereigntynetworklegalbasisanditsprototypeandapplicationswithminarchitecture |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5006684530 (Au-PeEL)EBL6684530 (OCoLC)1262726674 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture. |
author2_original_writing_str_mv |
noLinkedField |
marc_error |
Info : Unimarc and ISO-8859-1 translations identical, choosing ISO-8859-1. --- [ 856 : z ] |
_version_ |
1792331060111998976 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07946nam a22004213i 4500</leader><controlfield tag="001">5006684530</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073842.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811626708</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789811626692</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006684530</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6684530</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1262726674</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5-5105.9</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Hui.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Co-Governed Sovereignty Network :</subfield><subfield code="b">Legal Basis and Its Prototype and Applications with MIN Architecture.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore Pte. Limited,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">Ã2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (284 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Foreword I: From IP to MIN by Prof. Weimin Zheng -- Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li -- Preface -- Acknowledgements -- Contents -- About the Authors -- 1 Sovereignty and Network Sovereignty -- 1.1 Historical Background -- 1.1.1 Origin of Traditional Sovereignty -- 1.1.2 Traditional Sovereignty -- 1.1.3 Mission of Sovereignty -- 1.2 Adaptability of Sovereignty in Cyberspace -- 1.2.1 Composition of Cyberspace -- 1.2.2 Network Sovereignty in the New Era -- 1.3 Exploration of Network Sovereignty -- 1.3.1 Theoretical Contend -- 1.3.2 Exploration and Practice -- 1.4 Overview of Network Sovereignty -- 1.4.1 Legal Connotation of Network Sovereignty -- 1.4.2 Layers of Network Sovereignty -- 1.4.3 Role of Network Sovereignty in Each Stage -- 1.5 Necessity of Advocating Network Sovereignty -- 1.5.1 Necessity of Dividing Information Sovereignty -- 1.5.2 Necessity of Network Territory -- 1.5.3 Necessity of Making Rules Under the Law -- References -- 2 Interpretation of Network Sovereignty -- 2.1 International Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber Warfare -- 2.2.2 Governance of Network Sovereignty -- 2.2.3 Strategic Layout of Some States -- 2.3 Safeguarding Network Sovereignty -- 2.3.1 Strengthen the Awareness of National Network Sovereignty -- 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace -- 2.3.3 Peace and Stability in Cyberspace -- 2.3.4 Expanding the Network Sovereignty Concept -- 2.4 Current Situation of the Sovereignty of Broadcasting TV Network -- 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty -- 2.5.1 United States Presidential Election and the Storming of the United States Capitol -- 2.5.2 Social Media Platforms Banned Trump's Accounts -- 2.5.3 Regulating the Power of Social Media Platform.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">References -- 3 Architecture of Sovereignty Network -- 3.1 Sovereignty Network -- 3.1.1 Definition of Sovereignty Network -- 3.1.2 Functional Requirements for Sovereignty Network -- 3.2 Existing Technologies -- 3.2.1 IPv9 -- 3.2.2 New IP -- 3.3 Architecture of Sovereignty Network -- 3.3.1 Framework -- 3.3.2 Multi-identifier System -- 3.3.3 Multi-identifier Router -- 3.3.4 Security Situation Awareness System -- 3.4 Processes in Sovereignty Network -- 3.4.1 Registration Process -- 3.4.2 Publishing Content by Ordinary Users -- 3.4.3 Publishing Content by Broadcast Network Staffs -- 3.4.4 Obtaining Content by Ordinary Users -- 3.4.5 Obtaining Content by Broadcast Network Staffs -- 3.4.6 Assessing to Sovereignty Data by Extranet Users -- 3.4.7 Signature Algorithm in MIN -- 3.5 Assessing the Security of Sovereignty Network -- 3.5.1 Anti-attacking Analysis -- 3.5.2 Security Mechanisms -- 3.6 Protocol Architecture of Sovereignty Network -- References -- 4 Key Technologies of Sovereignty Network -- 4.1 Identity Centric Network -- 4.1.1 MIN Based on Identity Centric Network -- 4.1.2 Data Transmission Scheme -- 4.1.3 Process of User Access -- 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology -- 4.2.1 PoV Consensus Algorithm -- 4.2.2 PoV Consensus Process -- 4.2.3 PoV Hierarchical Signature Mechanism -- 4.3 Routing Scheme for Billions of Multiple Identifiers -- 4.3.1 Border Gateway Protocol -- 4.3.2 Hyperbolic Identifier and Routing Scheme -- 4.3.3 Hash Table with Prefix Tree Algorithm (HPT) -- 4.4 Identity Authentication Scheme Based on Real Identity and Biometric -- 4.4.1 Introduction of User Biological Characteristics -- 4.4.2 Introduction of Each Module -- 4.4.3 Application Scenarios -- 4.5 Privacy Protection and Network Management -- 4.5.1 Electronic Visas of Sovereignty Network -- 4.5.2 Asymmetric Encryptions.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.5.3 Privacy Preserving Policy -- 4.6 Security Situation Awareness System -- 4.6.1 Innovative Points -- 4.6.2 Technical Terms -- 4.6.3 Application Scenarios -- 4.6.4 System Architecture -- 4.7 Security Analysis -- 4.7.1 Security Mechanisms -- 4.7.2 Security Mechanism of Network Architecture -- 4.7.3 Security Mechanism of Network Links -- 4.7.4 Security Mechanism of Core Components -- 4.7.5 Security Gain Brought by Sovereignty Network -- 4.7.6 Conclusion -- 4.8 Transmission Control -- 4.8.1 MIT Design -- 4.8.2 Active Congestion Detection -- 4.8.3 Explicit Congestion Notification -- 4.8.4 Hop-by-Hop Rate Shaping -- 4.8.5 Client Rate Adjustment -- 4.9 Addressing Model for Space-Terrestrial Integrated Networks -- 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks -- 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks -- 4.10 Identifier Extension Technology -- 4.10.1 Basic Formats for Network Packet -- 4.10.2 Identifiers Binding in MIS -- 4.10.3 Identifier Extension Mechanism -- 4.10.4 Procedure of the Packet Processing -- References -- 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN -- 5.1 Experiments of the Prototype System -- 5.1.1 User Registration and Resource Publishing -- 5.1.2 Accessing to IP Internal Network Resource -- 5.1.3 Accessing to External IP Resources -- 5.1.4 Certification Between Sovereignty Networks -- 5.1.5 Data Filtering Function of EMIR -- 5.1.6 E-Mail Transmission in Sovereignty Network -- 5.1.7 Voting Through Blockchain -- 5.2 MIN-Security Reliable Private Network -- 5.2.1 MIN-SRPN -- 5.2.2 Water Utilities System Based on MIN-SRPN -- 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN -- 5.3 MIN Adopted in the Industrial Internet -- 5.3.1 National Industrial Internet Identifier Resolution System with MIN.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.3.2 National Industrial Internet with MIN -- 5.3.3 Inter-translation of Multiple Network Identifiers -- 5.3.4 Identifier Resolution in Automotive Industrial Internet -- 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy -- 5.4.1 Network Topology -- 5.4.2 Network Communications -- 5.4.3 An Example of the Multinational Interconnected Public Network -- 5.4.4 The United Nations of Cyberspace -- 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network -- 5.5.1 Current Work Basis -- 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN -- 5.5.3 5G Business -- 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G -- 5.5.5 Experiment and Evaluation of ST-MIN -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Xin.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Li, Hui</subfield><subfield code="t">Co-Governed Sovereignty Network</subfield><subfield code="d">Singapore : Springer Singapore Pte. Limited,c2021</subfield><subfield code="z">9789811626692</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6684530</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |