A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
PKI-Based Security for Peer-to-Peer Information Sharing
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Collaborative Automated Trust Negotiation in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Trusted Computing: Providing Security for Peer-to-Peer Networks
P2P '05 Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
A Property Based Framework for Trust and Reputation in Mobile Computing
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A practical generic privacy language
ICISS'10 Proceedings of the 6th international conference on Information systems security
Context sensitive privacy management in a distributed environment
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Hi-index | 0.00 |
We present a policy-based approach for the control of information flow between services. The controlled dissemination of information shared between services is achieved by the communication and enforcement of policies associated with shared information. The presented approach integrates easily as a communication middle-ware in existing service-based information systems keeping the management and distribution of policies transparent to the service implementation. This article focuses on the architecture and presents initial results that show the feasibility of the approach.