Logo des Repositoriums
 

An access control protocol for peer-to-peer applications using asymmetric cryptography

dc.contributor.authorVoigt, Sebastian
dc.contributor.editorHochberger, Christian
dc.contributor.editorLiskowsky, Rüdiger
dc.date.accessioned2019-06-12T12:32:17Z
dc.date.available2019-06-12T12:32:17Z
dc.date.issued2006
dc.description.abstractVirtual rooms and common information spaces are being used more and more frequently. In addition to internet-based solutions, ad-hoc InfoSpaces have been proposed. Their security has not been sufficiently investigated. This paper proposes a new protocol for peer-to-peer data exchange with support for access control for operations in the virtual rooms. Access rights for operations are kept in access control matrices and the security layer allows only operations from clients which are marked as allowed in the access control matrix. The protocol is based on the idea of hiding the identity of all peer-to-peer participants. Thus this protocol offers anonymity and full peer-to-peer support using asymmetric cryptography to distribute the access control matrices. This works without any central authority.en
dc.identifier.isbn978-3-88579-187-4
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/23687
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofINFORMATIK 2006 – Informatik für Menschen, Band 1
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-93
dc.titleAn access control protocol for peer-to-peer applications using asymmetric cryptographyen
dc.typeText/Conference Paper
gi.citation.endPage33
gi.citation.publisherPlaceBonn
gi.citation.startPage28
gi.conference.date2.-6. Oktober 2006
gi.conference.locationDresden
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings-93-4.pdf
Größe:
191.31 KB
Format:
Adobe Portable Document Format