The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research teams collaborating across institutional, geographical and cultural boundaries are increasingly common. Funding agencies including the National Science Foundation (NSF) and National Institutes of Health (NIH) strongly encourage virtual organization building and collaboration across institutions and disciplines. A set of software tools that enables scientists to efficiently share information...
The design of an efficient collaborative multi-robot framework that ensures the autonomy and the individual requirements of the involved robots is a very challenging task. This requires designing an efficient platform for inter-robot communication. P2P is a good approach to achieve this goal. P2P aims at making the communication ubiquitous thereby crossing the communication boundary and has many attractive...
Web access mode is the most popular and effective way to share resources between universities nowadays. Considering the opening and complexity of the Internet, Secure and authorized access resources method becomes a key problem. This paper proposed an access control mechanism based on RBAC (Role Based Access Control) for information and telecommunication resources sharing. Then, a resource sharing...
Computational grids have been at the forefront of e-science supercomputing for several years now. Many issues have been settled over the years, but some may only appear to be so. One of these issues is firewall traversal. Many solutions have been proposed and developed. We have developed two such solutions ourselves: Remus and Romulus, but like all other solutions, they are limited in application...
Online social networks with millions of users are very popular nowadays. They provide a platform for the users to present themselves and to interact with each other. In this paper, we present a totally distributed platform for social online networks based on the p2p paradigm, called LifeSocial.KOM. It provides the same functionality as common online social networks, while distributing the operational...
In the security community, one main focus has been devoted to the enhancement of access control approaches with new authentication and authorization capabilities with the server to restrict others' ability. However, in the peer-to-peer (P2P) networks, no such centralized server exists, especially for the pure P2P, and the peers have to interact with unfamiliar peers. To prevent or discourage peers...
In view of the lack of security and management mechanism in peer to peer (P2P) network, this paper designs an operational and scalable intelligent node overlay network which is P2P-oriented with digital right management functionality and good authentication and accounting capabilities supporting large-scale deployment. It not only can convenience the network communication and make the share and interact...
Because of the anonymity and dynamic characters of peer-to-peer(P2P) overlay networks, trust management plays a more and more role for information security and successful transaction. Although people have recognized the importance of security for their personal information, they remain uncertain when they have to define and enforce their own access control rules or have to handle indirect information...
The trust mechanism is researched more in existing P2P literatures, but the access control strategy about information integrality in P2P network is discussed less. In this regard, the integrality grade, and the reputation grade, of the subject and of the object are introduced, and the ideas of existing access control strategy and Biba model are used in the paper. A P2P information security model based...
Nowadays, P2P file-sharing systems have gained a large acceptance among the Internet users. However, there has been little relatively work done in access control for P2P networks, where security is a critical requirement for broader applications of the technology not only in the current but also in the future. In this work, a new architecture is presented in this paper, it integrates the aspects of...
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks recently for identity verification and authentication purposes. However, current IBC-based solutions could not address the problem of secure private key issuing. In this paper we propose SKIP: a novel secure key issuing scheme for P2P networks using IBC. We present an IBC infrastructure setup phase, a peer registration...
In order to overcome the existing deficiencies that studies pure trust mechanism in the current P2P research, the concept of the availability grade and the reputation grade such as the subject and the object are introduced. A new P2P access control model based on trust and availability is defined, which strategies are compatible and expansion of the existing access control strategy, by used the existing...
Threshold cryptography distributes the ability to provide a cryptographic service such as decryption or signing. It is an ideal choice to provide security services, such as authentication and access control, in MANETs or P2P systems. The paper proposes an ID- based threshold signature scheme, which has three attractive properties: (1) The user's co-signing key and signature share are all verifiable,...
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algorithms designed to prevent free-riding typically assume that connectivity is not a problem. However, on the Internet, a large fraction of the peers resides behind a firewall or NAT, making them unable to accept incoming connections...
The trust mechanism is researched more in existing P2P literatures, but the access control strategy about information confidentiality in P2P network is discussed less. In this regard, the classifications grade, and the reputation grade, of the subject and of the object are introduced, and the ideas of existing access control strategy and BLP model are used in the paper. A P2P information security...
Nowadays, most of access control models have been studied extensively in centralized and static environment, and they seldom meet the requirements of some dynamic collaborative environments, such as Grid, P2P and ad-hoc network. In this paper, the trust mechanism of the agents in collaborative environments is analyzed, a suitable method is introduced for calculating the agentpsilas trust in collaborative...
New important emerging business paradigms, such as ldquoservice virtualizationrdquo can be made easy and convenient by the use of P2P systems. In these paradigms, often the owners of the services are different (and independent) from the owners of the resources used to offer such services. In comparison to centralized servers, P2P systems can conveniently offer higher availability and more bandwidth...
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp...
In this paper, we suggest a peer authentication method that authorizes the peer which requests the other peer to use a service of it on super peer based peer-to-peer (P2P) network architecture. The proposed peer authentication method, at which one-time session-keys, public key certificate (PKC) and ticket authentication mechanism are applied, enables each peer to perform strong mutual authentication...
In this paper, we suggest a strong peer authentication algorithm that authorizes the peer which requests a service usage of the other peer in super peer based P2P network environment. The proposed peer authentication method, at which public key certificate (PKC) and Kerberos authentication mechanism is applied, enables each peer to perform strong mutual authentication in P2P network environment. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.