-
1
-
-
38149029744
-
-
Available from: .
-
-
-
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi M., Burrows M., Lampson B., and Plotkin G. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems (TOPLAS) 15 4 (1993) 706-734
-
(1993)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
38149080110
-
-
K. Aberer, M. Hauswirth, An overview on peer-to-peer information systems, in: Proceedings of Workshop on Distributed Data and Structures, Paris, France, March 2002, pp. 171-188.
-
-
-
-
4
-
-
33751033652
-
-
W. Adams, N. Davis, Tms: a trust management system for access control in dynamic collaborative environments, in: Proceedings of the 25th International Conference on Performance, Computing, and Communications, IEEE, Arizona, USA, April 2006.
-
-
-
-
6
-
-
84947273682
-
-
J. Douceur, The sybil attack, in: Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Cambridge, USA, March 2002, pp. 251-260.
-
-
-
-
7
-
-
0030401410
-
-
W. Edwards, Policies and roles in collaborative applications, in: Proceedings of the ACM Conference on Computer Supported Cooperative Work, ACM, ACM Press, Boston, Massachusetts, November 1996, pp. 11-20.
-
-
-
-
8
-
-
38149058544
-
-
S. Farrell, R. Housley. An internet attribute certificate profile for authorization. RFC 3281, April 2002.
-
-
-
-
9
-
-
11844265607
-
-
P. Fenkam, S. Dustdar, E. Kirda, G. Reif, H. Gall, Towards an access control system for mobile peer-to-peer collaborative environments, in: Proceedings of the 11th IEEE International Workshops on Enabling Technologies, IEEE Computer Society, Pittsburgh, USA, June 2002, pp. 95-102.
-
-
-
-
10
-
-
84979291225
-
-
A. Fiat, M. Naor, Broadcast encryption, in: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, California, USA, August 1994, pp. 480-491.
-
-
-
-
11
-
-
0035789229
-
-
J. Hubaux, L. Buttyán, S. Capkun, The quest for security in mobile ad hoc networks, in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking and computing, Long Beach, USA, 2001, pp. 146-155.
-
-
-
-
12
-
-
38149080894
-
-
A. Juels, J. Brainard, Client puzzles: a cryptographic defense against connection depletion attacks, in: Proceedings of the Networks and Distributed Security Systems, California, USA, February 1999, pp. 151-165.
-
-
-
-
14
-
-
38149119253
-
Authentication and authorization infrastructures (aais): a comparative survey
-
Lopez J., Oppliger R., and Pernul G. Authentication and authorization infrastructures (aais): a comparative survey. Computer Communications 27 16 (2004) 1608-1616
-
(2004)
Computer Communications
, vol.27
, Issue.16
, pp. 1608-1616
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
15
-
-
77951436121
-
-
P. Maniatis, T. Giuli, M. Roussopoulos, D. Rosenthal, M. Baker, Impeding attrition attacks in p2p systems, in: Proceedings of the 11th ACM SIGOPS European Workshop, ACM, Leuven, Belgium, September 2004.
-
-
-
-
16
-
-
38349034383
-
-
E. Palomar, J. Estevez-Tapiador, J. Hernandez-Castro, A. Ribagorda, Certificate-based access control in pure p2p networks, in: Proceedings of the 6th International Conference on Peer-to-Peer Computing, IEEE, Cambridge, UK, September 2006, pp. 177-184.
-
-
-
-
17
-
-
29244432773
-
-
V. Pathak, L. Iftode, Byzantine fault tolerant public key authentication in peer-to-peer systems. Computer Networks. Special Issue on Management in Peer-to-Peer Systems: Trust, Reputation and Security, 50(4):579-596, March 2006.
-
-
-
-
18
-
-
30144435491
-
-
R. Sandhu, X. Zhang, Peer-to-peer access control architecture using trusted computing technology, in: Proceedings of the 10th ACM symposium on Access control models and technologies, ACM, Stockholm, Sweden, June 2005, pp. 147-158.
-
-
-
-
19
-
-
4544372572
-
-
A. Selcuk, E. Uzun, M. Pariente, A reputation-based trust management system for p2p networks, in: Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid, Chicago, USA, April 2004, pp. 251-258.
-
-
-
-
20
-
-
38149010759
-
-
Q. Tang, K. Choo, Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks, in: Proceedings of the 4th International Conference on Applied Cryptography and Network Security, Singapore, June 2006.
-
-
-
-
21
-
-
24344501341
-
Access control in collaborative systems
-
Tolone W., Ahn G., Pai T., and Hong S. Access control in collaborative systems. ACM Computing Surveys 37 1 (2005) 29-41
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.2
Pai, T.3
Hong, S.4
-
22
-
-
30144435965
-
Enhancing data authenticity and integrity in p2p systems
-
Zhang X., Chen S., and Sandhu R. Enhancing data authenticity and integrity in p2p systems. IEEE Internet Computing (2005) 42-49
-
(2005)
IEEE Internet Computing
, pp. 42-49
-
-
Zhang, X.1
Chen, S.2
Sandhu, R.3
|