Abstract
Web service is giving an equal privilege to all user for sharing their resources. Under this situation, lots of vulnerabilities against the various attacks through the Internet are possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Key Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own right.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Milojicic, D.S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.: Peer-to-Peer Computing, Hewlett-Packard Company (2002)
Oram, A.: PEER-to-PEER, O’Relly (2001)
Kim, B.H., Lim, M.H., Lim, J.M., Lee, J.K.: Threats of Information Security and its Service in P2P Environment. Korea Information Security 12(5) (2002)
Dreamtech Software Team: Peer-to-Peer Application Development: Cracking the Code. John Wiley & Sons (2001)
Wang, Y.: SPKI. Network Security (1998)
Saito, T., Umesawa, K., Okuno, H.G.: Privacy Enhanced Access Control by SPKI. IEEE, Los Alamitos (2000)
Ellision, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (September 1999)
Oishi, K.: Unconditionally Anonymous Public-key Certificates and their Applications, Master thesis (August 1999)
Molva, R., Roudier, Y.: A Distributed Access Control Model for Java. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, Springer, Heidelberg (2000)
Saroiu, S., Gummadi, P.K., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: MMCN (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J.G., Lee, Dh. (2007). An Access Control Using SPKI Certificate in Peer-to-Peer Environment. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)