A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Policies and roles in collaborative applications
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Enhancing Data Authenticity and Integrity in P2P Systems
IEEE Internet Computing
A reputation-based trust management system for P2P networks
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
Impeding attrition attacks in P2P systems
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Certificate-based Access Control in Pure P2P Networks
P2P '06 Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing
Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
Globe '09 Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems
Formal proof of cooperativeness in a multi-party P2P content authentication protocol
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
A peer-to-peer content-distribution scheme resilient to key leakage
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Hi-index | 0.24 |
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as content authenticity and integrity, as well as to enforce appropriate access control policies. These mechanisms would pave the way for new models in which content providers can exert some control over the replication and file sharing process. However, the extremely decentralized nature of these environments makes impossible to apply classic solutions that rely on some kind of fixed infrastructure, typically in the form of on-line trusted third parties (TTP). In this paper, we introduce a suite of protocols for content authentication and access control in pure P2P networks based on attribute certificates that does not rely on the existence of a public key infrastructure (PKI), privilege management infrastructure (PMI), or any other form of centralized authority. We provide an analysis concerning the efficiency (computational effort and communication overhead) and the security of our proposal.