About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Workshop on Hot Topics in Peer-to-Peer Systems

Research Article

Introducing secure peergroups in SP2A

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/HOT-P2P.2005.11,
        author={Michele  Amoretti and Matteo  Bisi and Francesco  Zanichelli and Gianni  Conte},
        title={Introducing secure peergroups in SP2A},
        proceedings={2nd International ICST Workshop on Hot Topics in Peer-to-Peer Systems},
        publisher={IEEE},
        proceedings_a={HOT-P2P},
        year={2005},
        month={10},
        keywords={},
        doi={10.1109/HOT-P2P.2005.11}
    }
    
  • Michele Amoretti
    Matteo Bisi
    Francesco Zanichelli
    Gianni Conte
    Year: 2005
    Introducing secure peergroups in SP2A
    HOT-P2P
    IEEE
    DOI: 10.1109/HOT-P2P.2005.11
Michele Amoretti1,*, Matteo Bisi1,*, Francesco Zanichelli1, Gianni Conte1
  • 1: Dipartimento di Ingegneria dell'Informazione, Universita' di Parma
*Contact email: amoretti@ce.unipr.it, mbisi@ce.unipr.it

Abstract

Service-oriented grids are aiming at new applications beyond traditional resource-oriented scientific computing. We argue that Community Support is emerging as the real killer application. Service-oriented systems provide a flexible solution for work groups which belong to university campuses, research labs, enterprises, finance environments. We are building the service-oriented P2P architecture (SP2A), which is the result of the positive convergence between grid and peer-to-peer computing. P2P design allows to overcome the limitations of available mechanisms for publishing and discovering grid services, which are essentially based on centralized directories, thus raising robustness, scalability and performance concerns. SP2A is constituted by distinct communities of peers organized for specific purposes. In this paper we illustrate the group security policies of SP2A, which define the mechanisms for peer authentication, peergroup admission control, authorization and transport security. Prototype implementation details are also exposed.

Published
2005-10-24
Publisher
IEEE
http://dx.doi.org/10.1109/HOT-P2P.2005.11
Copyright © 2005–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL