Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/1375
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Arnedo-Moreno, Joan | - |
dc.contributor.author | Herrera-Joancomartí, Jordi | - |
dc.contributor.other | Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON) | en |
dc.date.accessioned | 2010-02-16T11:57:36Z | - |
dc.date.available | 2010-02-16T11:57:36Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | ARNEDO, J.; HERRERA-JOANCOMARTÍ, J. (2008). "Persistent interoperable security for JXTA". In: Proceedings of the Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC) 2008. Pág. 354- 359. | - |
dc.identifier.isbn | 0-7695-3109-1 | - |
dc.identifier.isbn | 978-0-7695-3109-0 | - |
dc.identifier.uri | http://hdl.handle.net/10609/1375 | - |
dc.description.abstract | In order to access resources within a peer-to-peer network, JXTA completely relies in the usage of advertisements published by the resource owner. This may easily lead to DoS or spoofing attacks from malicious peers by forging advertisements with false identifiers unless advertisement authenticity is pro- vided. Furthermore, in a fully distributed environment, in order to truly isolate a malicious node, collaboration is necessary from other peers. For that reason, it must be possible to prove to other parties that a peer is being disruptive. This paper presents a method that provides authenticity and non-repudiation to JXTA advertisements. This scheme is fully distributed and based in a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments. | en |
dc.language.iso | eng | - |
dc.rights | (c) 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. | - |
dc.subject.lcsh | JXTA (Computer network protocol) | en |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Java (Computer program language) | en |
dc.title | Persistent interoperable security for JXTA | - |
dc.type | info:eu-repo/semantics/bookPart | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | JXTA (Protocols de xarxes d'ordinadors) | ca |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat | ca |
dc.subject.lemac | Java (Llenguatge de programació) | ca |
dc.subject.lcshes | JXTA (Protocolos de comunicaciones) | es |
dc.subject.lcshes | Redes informáticas -- Medidas de seguridad | es |
dc.subject.lcshes | Java (Lenguaje de programación) | es |
dc.identifier.doi | 10.1109/CISIS.2008.7 | - |
Aparece en las colecciones: | Capítols o parts de llibres |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Arnedo_JAM08.pdf | 126,74 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.