메뉴 건너뛰기




Volumn 31, Issue 2, 2008, Pages 266-279

Secure content access and replication in pure P2P networks

Author keywords

Access control; Content authentication; Peer to Peer security; Public key certificates

Indexed keywords

ACCESS CONTROL; COMPUTATIONAL METHODS; CONTENT BASED RETRIEVAL; DISTRIBUTED COMPUTER SYSTEMS; FILE ORGANIZATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 38149134562     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.08.015     Document Type: Article
Times cited : (12)

References (22)
  • 1
    • 38149029744 scopus 로고    scopus 로고
    • Available from: .
  • 3
    • 38149080110 scopus 로고    scopus 로고
    • K. Aberer, M. Hauswirth, An overview on peer-to-peer information systems, in: Proceedings of Workshop on Distributed Data and Structures, Paris, France, March 2002, pp. 171-188.
  • 4
    • 33751033652 scopus 로고    scopus 로고
    • W. Adams, N. Davis, Tms: a trust management system for access control in dynamic collaborative environments, in: Proceedings of the 25th International Conference on Performance, Computing, and Communications, IEEE, Arizona, USA, April 2006.
  • 6
    • 84947273682 scopus 로고    scopus 로고
    • J. Douceur, The sybil attack, in: Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Cambridge, USA, March 2002, pp. 251-260.
  • 7
    • 0030401410 scopus 로고    scopus 로고
    • W. Edwards, Policies and roles in collaborative applications, in: Proceedings of the ACM Conference on Computer Supported Cooperative Work, ACM, ACM Press, Boston, Massachusetts, November 1996, pp. 11-20.
  • 8
    • 38149058544 scopus 로고    scopus 로고
    • S. Farrell, R. Housley. An internet attribute certificate profile for authorization. RFC 3281, April 2002.
  • 9
    • 11844265607 scopus 로고    scopus 로고
    • P. Fenkam, S. Dustdar, E. Kirda, G. Reif, H. Gall, Towards an access control system for mobile peer-to-peer collaborative environments, in: Proceedings of the 11th IEEE International Workshops on Enabling Technologies, IEEE Computer Society, Pittsburgh, USA, June 2002, pp. 95-102.
  • 10
    • 84979291225 scopus 로고    scopus 로고
    • A. Fiat, M. Naor, Broadcast encryption, in: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, California, USA, August 1994, pp. 480-491.
  • 11
    • 0035789229 scopus 로고    scopus 로고
    • J. Hubaux, L. Buttyán, S. Capkun, The quest for security in mobile ad hoc networks, in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking and computing, Long Beach, USA, 2001, pp. 146-155.
  • 12
    • 38149080894 scopus 로고    scopus 로고
    • A. Juels, J. Brainard, Client puzzles: a cryptographic defense against connection depletion attacks, in: Proceedings of the Networks and Distributed Security Systems, California, USA, February 1999, pp. 151-165.
  • 14
    • 38149119253 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures (aais): a comparative survey
    • Lopez J., Oppliger R., and Pernul G. Authentication and authorization infrastructures (aais): a comparative survey. Computer Communications 27 16 (2004) 1608-1616
    • (2004) Computer Communications , vol.27 , Issue.16 , pp. 1608-1616
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 15
    • 77951436121 scopus 로고    scopus 로고
    • P. Maniatis, T. Giuli, M. Roussopoulos, D. Rosenthal, M. Baker, Impeding attrition attacks in p2p systems, in: Proceedings of the 11th ACM SIGOPS European Workshop, ACM, Leuven, Belgium, September 2004.
  • 16
    • 38349034383 scopus 로고    scopus 로고
    • E. Palomar, J. Estevez-Tapiador, J. Hernandez-Castro, A. Ribagorda, Certificate-based access control in pure p2p networks, in: Proceedings of the 6th International Conference on Peer-to-Peer Computing, IEEE, Cambridge, UK, September 2006, pp. 177-184.
  • 17
    • 29244432773 scopus 로고    scopus 로고
    • V. Pathak, L. Iftode, Byzantine fault tolerant public key authentication in peer-to-peer systems. Computer Networks. Special Issue on Management in Peer-to-Peer Systems: Trust, Reputation and Security, 50(4):579-596, March 2006.
  • 18
    • 30144435491 scopus 로고    scopus 로고
    • R. Sandhu, X. Zhang, Peer-to-peer access control architecture using trusted computing technology, in: Proceedings of the 10th ACM symposium on Access control models and technologies, ACM, Stockholm, Sweden, June 2005, pp. 147-158.
  • 19
    • 4544372572 scopus 로고    scopus 로고
    • A. Selcuk, E. Uzun, M. Pariente, A reputation-based trust management system for p2p networks, in: Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid, Chicago, USA, April 2004, pp. 251-258.
  • 20
    • 38149010759 scopus 로고    scopus 로고
    • Q. Tang, K. Choo, Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks, in: Proceedings of the 4th International Conference on Applied Cryptography and Network Security, Singapore, June 2006.
  • 21
  • 22
    • 30144435965 scopus 로고    scopus 로고
    • Enhancing data authenticity and integrity in p2p systems
    • Zhang X., Chen S., and Sandhu R. Enhancing data authenticity and integrity in p2p systems. IEEE Internet Computing (2005) 42-49
    • (2005) IEEE Internet Computing , pp. 42-49
    • Zhang, X.1    Chen, S.2    Sandhu, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.