About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Conference on Communications and Networking in China

Research Article

Designing Security Architecture for a P2P Video Conference System

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469419,
        author={Fuwen Liu and Hartmut Koenig},
        title={Designing Security Architecture for a P2P Video Conference System},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Collaboration  Collaborative work  Computer science  Costs  Data security  Information security  Peer to peer computing  Protection  Video sharing  Videoconference},
        doi={10.1109/CHINACOM.2007.4469419}
    }
    
  • Fuwen Liu
    Hartmut Koenig
    Year: 2008
    Designing Security Architecture for a P2P Video Conference System
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469419
Fuwen Liu1,*, Hartmut Koenig1,*
  • 1: Brandenburg University of Technology Cottbus Department of Computer Science PF 10 13 44, 03013 Cottbus, Germany
*Contact email: lfw@informatik.tu-cottbus.de, Koenig@informatik.tu-cottbus.de

Abstract

More and more modern group oriented collaborative applications use the peer-to-peer (P2P) paradigm to be independent of expensive infrastructures as they are, for instance, provided for audio and video conferences by H.323 systems. Decentralized collaborative P2P solutions require appropriate mechanisms to protect group privacy and data integrity. A centralized client/ server based video conference system can be well shielded in a standard manner, whilst there are no off-the-shelf approaches to securing a P2P video conference up to now. This paper addresses this urgent issue by presenting an effective and flexible security architecture and showing how it can be embedded into a P2P video conferencing system using the BRAVIS system [4] as an example.

Keywords
Collaboration Collaborative work Computer science Costs Data security Information security Peer to peer computing Protection Video sharing Videoconference
Published
2008-03-07
Publisher
IEEE
Modified
2011-07-17
http://dx.doi.org/10.1109/CHINACOM.2007.4469419
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL