OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Secure Peer-to-Peer Networking: The JXTA Example
IT Professional
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
An Efficient and Secure Peer-to-Peer Overlay Network
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Secure multi-agent system for multi-hop environments
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Hi-index | 0.00 |
Peer-to-peer systems have the ability to connect network nodes in a convenient and simple manner. Thus, they are used in a broad range of applications to connect nodes with different capabilities in terms of computational power, memory and energy. For all these peer-to-peer systems there doesn't exist a coherent and dynamic security concept which allows application designers to simply specify their security requirements and are thereafter offered security features to protect applications against threats. In this paper we outline a general peer-to-peer model offering a dynamic security concept which allows for simple selection of an appropriate security level.