Role-Based Access Control Models
Computer
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
A secure workflow system for dynamic collaboration
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Protecting Free Expression Online with Freenet
IEEE Internet Computing
IEEE Internet Computing
Web Services and Context Horizons
Computer
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Preventing information leakage within workflows that execute among competing organizations
Journal of Systems and Software - Special issue: Software engineering education and training
DPE/PAC: decentralized process engine with product access control
Journal of Systems and Software
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic key management solution to access hierarchy
International Journal of Network Management
International Journal of Computer Integrated Manufacturing
Expert Systems with Applications: An International Journal
International Journal of Networking and Virtual Organisations
Access control management in open distributed virtual repositories and the grid
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
An immunological approach for file recovery over JXTA peer-to-peer framework
International Journal of Network Management
User-managed access control for health care systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Agent roles for context-aware p2p systems
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
Fairness and access control for mobile P2P auctions over MANETs
Journal of Theoretical and Applied Electronic Commerce Research
Hi-index | 0.00 |
In Peer-to-Peer (P2P) computing environments, each participant (peer) acts as both client and content provider. This satisfies the requirement that resources should be increasingly made available by being published to other users from a user's machine. Compared with services performed by the client-server model, P2P-based services have several advantages. However, wide-scale application of P2P computing is constrained by limitations associated with the especially sophisticated control mechanisms needed between peers. To overcome these limitations, we introduce a controlled P2P computing architecture by extending the concept of Web services to the peer-to-peer level through a generic middleware. Specifically, in this paper we tailor our approach to support RBAC. Although our approach supports both brokered and purist P2P models, all of the policy decisions can be made on the peer side, because policy information is transferred from the policy servers to the corresponding peers through metadata that peers can understand. Each peer makes the access control decision based on the enterprise, the community, and the peer policies without asking other components. This approach supports RBAC services for collaborative enterprise in P2P computing environments, not only within one community but also within inter-communities. Furthermore, it also supports peers' autonomous decisions without causing policy conflicts. The broad dissemination of our approach would enable P2P technology to be applicable to more reliable and efficient services, providing controlled communications between peers.