Loading [a11y]/accessibility-menu.js
Flexible Security Configuration & Deployment in Peer-to-Peer Applications | IEEE Conference Publication | IEEE Xplore

Flexible Security Configuration & Deployment in Peer-to-Peer Applications


Abstract:

The widespread adoption of P2P applications in environments beyond ordinary file sharing demands the fulfillment of several security requirements. Important steps have be...Show More

Abstract:

The widespread adoption of P2P applications in environments beyond ordinary file sharing demands the fulfillment of several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) tackle a wide range of requirements in an integrated fashion. In addition, they oblige the user/application to manipulate a complex programming interface, as well as going through a cumbersome configuration process. To address these issues, we present P2PSL (P2P security layer), which allows gradual and flexible integration of security functionality into P2P applications. To show concept and technical feasibility, we have implemented P2PSL, assessed the overhead it induces, and incorporated the layer into a P2P-based grid computing infrastructure
Date of Conference: 03-07 April 2006
Date Added to IEEE Xplore: 23 October 2006
Print ISBN:1-4244-0142-9

ISSN Information:

Conference Location: Vancouver, BC, Canada

References

References is not available for this document.