Show simple item record

dc.contributor.authorVoigt, Sebastian
dc.contributor.editorHochberger, Christian
dc.contributor.editorLiskowsky, Rüdiger
dc.date.accessioned2019-06-12T12:32:17Z
dc.date.available2019-06-12T12:32:17Z
dc.date.issued2006
dc.identifier.isbn978-3-88579-187-4
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/23687
dc.description.abstractVirtual rooms and common information spaces are being used more and more frequently. In addition to internet-based solutions, ad-hoc InfoSpaces have been proposed. Their security has not been sufficiently investigated. This paper proposes a new protocol for peer-to-peer data exchange with support for access control for operations in the virtual rooms. Access rights for operations are kept in access control matrices and the security layer allows only operations from clients which are marked as allowed in the access control matrix. The protocol is based on the idea of hiding the identity of all peer-to-peer participants. Thus this protocol offers anonymity and full peer-to-peer support using asymmetric cryptography to distribute the access control matrices. This works without any central authority.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofINFORMATIK 2006 – Informatik für Menschen, Band 1
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-93
dc.titleAn access control protocol for peer-to-peer applications using asymmetric cryptographyen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages28-33
mci.conference.sessiontitleRegular Research Papers
mci.conference.locationDresden
mci.conference.date2.-6. Oktober 2006


Files in this item

Thumbnail

Show simple item record