2nd International ICST Workshop on Trusted Collaboration

Research Article

Secure Peer-to-peer Networks for Trusted Collaboration

  • @INPROCEEDINGS{10.1109/COLCOM.2007.4553810,
        author={Kevin W. Hamlen and Bhavani Thuraisingham},
        title={Secure Peer-to-peer Networks for Trusted Collaboration},
        proceedings={2nd International ICST Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2008},
        month={6},
        keywords={Access control  Availability  Collaboration  Computer networks  Computer science  Data security  Network servers  Peer to peer computing  Robustness  Technology management},
        doi={10.1109/COLCOM.2007.4553810}
    }
    
  • Kevin W. Hamlen
    Bhavani Thuraisingham
    Year: 2008
    Secure Peer-to-peer Networks for Trusted Collaboration
    TRUSTCOL
    IEEE
    DOI: 10.1109/COLCOM.2007.4553810
Kevin W. Hamlen1,*, Bhavani Thuraisingham1,*
  • 1: Computer Science Department – MS EC31, University of Texas at Dallas, 800 W. Campbell Rd., Richardson, Texas 75080-3021, USA
*Contact email: hamlen@utdallas.edu, bhavani.thuraisingham@utdallas.edu

Abstract

An overview of recent advances in secure peer-to-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policies in these decentralized, distributed systems. These technologies are combined with reputation-based trust management systems to enforce integrity-based discretionary access control policies. Particular attention is devoted to the problem of developing secure routing protocols that constitute a suitable foundation for implementing this security system. The research is examined as a basis for developing a secure data management system for trusted collaboration applications such as e-commerce, situation awareness, and intelligence analysis.