The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
An Integrated Solution for Secure Group Communication in Wide-Area Networks
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
Role-based access management for ad-hoc collaborative sharing
Proceedings of the eleventh ACM symposium on Access control models and technologies
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Architecting secure mobile P2P systems
Proceedings of the 1st international workshop on Software architectures and mobility
An access control mechanism for P2P collaborations
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
Agent Computing and Multi-Agent Systems
A modeling framework of content pollution in Peer-to-Peer video streaming systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Distributed Privilege Enforcement in PACS
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Secured web services based on extended usage control
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Accountable file indexing against DDoS attacks in peer-to-peer networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Network-aware heuristics for inter-domain meta-scheduling in Grids
Journal of Computer and System Sciences
Optimistic access control for distributed collaborative editors
Proceedings of the 2011 ACM Symposium on Applied Computing
A peer-to-peer architecture for data-intensive cycle sharing
Proceedings of the first international workshop on Network-aware data management
Orchestrating access control in peer data management systems
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
ShareEnabler: policy-driven access management for ad-hoc collaborative sharing
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Controlling data dissemination
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Policy-driven role-based access management for ad-hoc collaboration
Journal of Computer Security
Hi-index | 0.00 |
Free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a collection of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.