Secure Peer-to-Peer Networking: The JXTA Example
IT Professional
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
An Efficient and Secure Peer-to-Peer Overlay Network
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Hi-index | 0.00 |
The importance of P2P systems in real-world applications has grown significantly over the recent years. Although P2P systems have found its way into almost every field of application the lack of an adequate general security concept, research for specific security mechanisms and implementations of possible security improvements is still limiting their full potential. We are focusing on getting an overall view on the security of embedded P2P systems and on finding promising mechanisms and solutions to this challenging task. This work tries to make the first step towards secure heterogeneous pure P2P systems by specifying an appropriate overall security concept.