Scaling secure group communication systems: Beyond peer-to-peer

被引:1
|
作者
Amir, Y [1 ]
Nita-Rotaru, C [1 ]
Stanton, J [1 ]
Tsudik, G [1 ]
机构
[1] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
关键词
D O I
10.1109/DISCEX.2003.1194887
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemented in servers, in contrast to a layered architecture where the same services are implemented in clients. We discuss the performance and accompanying trust issues of each proposed architecture and present experimental results that demonstrate the superior scalability of an integrated architecture.
引用
收藏
页码:226 / 237
页数:12
相关论文
共 50 条
  • [1] Secure peer-to-peer Group Communication Framework
    Noda, J
    Taguchi, D
    Tani, M
    Nakamura, N
    [J]. NEC RESEARCH & DEVELOPMENT, 2003, 44 (04): : 333 - 339
  • [2] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [3] SPP: A Secure Protocol for Peer-to-Peer Systems
    Quang Hieu Vu
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 1 - 6
  • [4] PGSP: A protocol for secure communication in peer-to-peer system
    Arora, N
    Shyamasundar, RK
    [J]. 2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2094 - 2099
  • [5] A Scalable Peer-to-Peer Group Communication Protocol
    Tsuneizumi, Isamu
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 268 - 275
  • [6] In Search of an Anonymous and Secure Lookup Attacks on Structured Peer-to-Peer Anonymous Communication Systems
    Wang, Qiyan
    Mittal, Prateek
    Borisov, Nikita
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 308 - 318
  • [7] Scalable and secure peer-to-peer systems with support for QoS
    Shukla, J
    [J]. FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 47 - 47
  • [8] Enabling Secure Communication Over Existing Peer-to-Peer Frameworks
    Reiter, Andreas
    [J]. 23RD EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2015), 2015, : 575 - 582
  • [9] A secure peer-to-peer group collaboration scheme for healthcare system
    Lim, BI
    Choi, KH
    Shin, DR
    [J]. COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 346 - 349
  • [10] Expanding trust beyond reputation in peer-to-peer systems
    Bearly, T
    Kumar, V
    [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 966 - 970