Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
An end-to-end approach to host mobility
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Looking up data in P2P systems
Communications of the ACM
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Reconsidering Internet Mobility
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
FARA: reorganizing the addressing architecture
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Unmanaged Internet Protocol: taming the edge network management crisis
ACM SIGCOMM Computer Communication Review
A layered naming architecture for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Providing administrative control and autonomy in structured peer-to-peer overlays
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Hi-index | 0.00 |
The emerging issues of personal and network mobility have created a need for the decoupling of identity from location in Internet addressing. This decoupling requires name resolution systems that can provide scalable resolution of globally unique persistent identifiers of communication endpoints, which may be users, devices, content or services. Recent developments in structured peer-to-peer overlay networks have made possible the scalable resolution of flat names, which opens up new possibilities in the area of naming and name resolution systems. In this paper we propose a scheme to provide authentication and verification in a name resolution system based on structured peer to peer networks such as distributed hash tables (DHTs). We specify how namespace security and global uniqueness may be managed with the use of public key cryptography. We also propose a framework within which independent overlay networks may compose a global namespace.