A security layer for JXTA core protocols

被引:2
|
作者
Arnedo-Moreno, Joan [1 ]
Herrera-Joancomarti, Jordi [2 ]
机构
[1] Univ Oberta Catalunya, Rb Poble Nou 156, Barcelona 08018, Spain
[2] Univ Autonoma Barcelona, Escola Tecnica SUper Dinginyeria, E-08193 Barcelona, Spain
关键词
peer-to-peer; security; peer group; JXTA; xmldsig; xmlenc;
D O I
10.1109/CISIS.2009.24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a method that provides security services to the core protocols: privacy, authenticity, integrity and non-repudiation. The presented mechanisms are fully distributed and based on a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments.
引用
收藏
页码:463 / +
页数:2
相关论文
共 50 条
  • [41] PROTOCOLS FOR DATA-SECURITY
    DEMILLO, R
    MERRITT, M
    [J]. COMPUTER, 1983, 16 (02) : 39 - 51
  • [42] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [43] Safely composing security protocols
    Cortier, Veronique
    Delaitre, Jeremie
    Delaune, Stephanie
    [J]. FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363
  • [44] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [45] Automated Composition of Security Protocols
    Bela, Genge
    Ignat, Iosif
    Piroska, Haller
    [J]. 2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
  • [46] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [47] What is Correctness of Security Protocols?
    Bella, Giampaolo
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (12) : 2083 - 2106
  • [48] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [49] Resiliency Aspects of Security Protocols
    Granado, Marcus C.
    [J]. SECURITY PROTOCOLS, 2010, 5964 : 37 - 57
  • [50] DYNAMIC TAGS FOR SECURITY PROTOCOLS
    Arapinis, Myrto
    Delaune, Stephanie
    Kremer, Steve
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2014, 10 (02)