Research Article
Secure Peer-to-peer Networks for Trusted Collaboration
@INPROCEEDINGS{10.1109/COLCOM.2007.4553810, author={Kevin W. Hamlen and Bhavani Thuraisingham}, title={Secure Peer-to-peer Networks for Trusted Collaboration}, proceedings={2nd International ICST Workshop on Trusted Collaboration}, publisher={IEEE}, proceedings_a={TRUSTCOL}, year={2008}, month={6}, keywords={Access control Availability Collaboration Computer networks Computer science Data security Network servers Peer to peer computing Robustness Technology management}, doi={10.1109/COLCOM.2007.4553810} }
- Kevin W. Hamlen
Bhavani Thuraisingham
Year: 2008
Secure Peer-to-peer Networks for Trusted Collaboration
TRUSTCOL
IEEE
DOI: 10.1109/COLCOM.2007.4553810
Abstract
An overview of recent advances in secure peer-to-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policies in these decentralized, distributed systems. These technologies are combined with reputation-based trust management systems to enforce integrity-based discretionary access control policies. Particular attention is devoted to the problem of developing secure routing protocols that constitute a suitable foundation for implementing this security system. The research is examined as a basis for developing a secure data management system for trusted collaboration applications such as e-commerce, situation awareness, and intelligence analysis.
Copyright © 2007–2024 IEEE