Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Access Control in Peer-to-Peer Collaborative Systems
ICDCSW '05 Proceedings of the First International Workshop on Mobility in Peer-to-Peer Systems - Volume 08
P-Hera: Scalable fine-grained access control for P2P infrastructures
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Peer-to-Peer Systems and Applications (Lecture Notes in Computer Science)
Peer-to-Peer Systems and Applications (Lecture Notes in Computer Science)
Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay Networks
ICDCSW '06 Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems
ALVIS peers: a scalable full-text peer-to-peer retrieval engine
P2PIR '06 Proceedings of the international workshop on Information retrieval in peer-to-peer networks
SkipNet: a scalable overlay network with practical locality properties
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Privacy-preserving indexing of documents on the network
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Secure management of networked storage services: models and techniques
Secure management of networked storage services: models and techniques
ID-replication for structured peer-to-peer systems
Euro-Par'12 Proceedings of the 18th international conference on Parallel Processing
Hi-index | 0.00 |
P2P data management systems provide a scalable alternative to centralized architectures. Their adoption, however, is limited by the lack of possibility to control the access to the resources stored in the system. We address this problem in the case of structured P2P networks, in particular, when the system is used in a collaborative working environment. We analyze the problem assuming a simple threat model and we systematically explore the solution possibilities. We design and compare access control enforcement techniques which realize the desired functionality by constructing independent networks or by implementing access control at query or at response time.