Results 1 - 10
of
83
Sirius: Securing remote untrusted storage
- in Proc. Network and Distributed Systems Security (NDSS) Symposium 2003
, 2003
"... This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. ..."
Abstract
-
Cited by 148 (2 self)
- Add to MetaCart
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing
Robust Accounting in Decentralized P2P Storage Systems
"... A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks, a central challenge is preventing “freeloaders”, or nodes that use disproportionately more storage on other peers than ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks, a central challenge is preventing “freeloaders”, or nodes that use disproportionately more storage on other peers than
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
"... Abstract—In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation based access control policies, denoted as SW-R2P. The SW-R2P system integrates the small world topology with zero ..."
Abstract
- Add to MetaCart
Abstract—In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation based access control policies, denoted as SW-R2P. The SW-R2P system integrates the small world topology with zero
P2P Group Management Systems: A Conceptual Analysis
"... Peer-to-Peer (P2P) networks are becoming eminent platforms for both distributed computing and interpersonal communication. Their role in contemporary multimedia content delivery and communication systems is strong, as witnessed by many popular applications and services. Groups in P2P systems can or ..."
Abstract
- Add to MetaCart
and disadvantages of using each P2P system architecture for implementing P2P group management. The evaluation criteria in the analysis are performance, robustness, fairness, suitability for battery-powered devices, scalability, and security. The outcome of the analysis facilitates the selection of an appropriate P2
Security for Management Interfaces to Transport Network Elements oif2002.375.06 Contribution Number: oif2002.375.06 Working Group: OAM&P TITLE: Security for Management Interfaces to Transport Network Elements
, 2003
"... Project Number: oif2002.346.04 ABSTRACT: This IA lists objectives for securing OAM&P interfaces to a Transport Network Element and then specifies ways of using security systems (e.g., IPsec or TLS) for securing these interfaces. It summarizes how well each of the systems, used as specified, sati ..."
Abstract
- Add to MetaCart
Project Number: oif2002.346.04 ABSTRACT: This IA lists objectives for securing OAM&P interfaces to a Transport Network Element and then specifies ways of using security systems (e.g., IPsec or TLS) for securing these interfaces. It summarizes how well each of the systems, used as specified
22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract
- Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system
A Security Architecture for Implementing Anonymity and Traceability In Wireless Mesh Network using Clustering Concept
"... is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users. However, security issues inherent in WMNs need be considered before the deployment and proliferation of these networks, since it is unappeal ..."
Abstract
- Add to MetaCart
for users to enjoy network services without being traced. While anonymity related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires
Improving security By Quantum Cryptography in P2P Reputation Management in Distributed Identities and Decentralized Recommendation Chains
"... Abstract—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristi ..."
Abstract
- Add to MetaCart
a distributed and collaborative approach for a dynamic peer group. In this paper presents quantum key distribution protocols (QKDPs) to safeguard security in large p2p networks, using in new directions in classical cryptography and quantum cryptography. Two mediator protocols, one with implicit user
Results 1 - 10
of
83