Filters








23,888 Hits in 3.8 sec

SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks

Pierre St. Juste, David Wolinsky, P. Oscar Boykin, Michael J. Covington, Renato J. Figueiredo
2010 Computer Networks  
The main contribution of this paper is a new peer-to-peer overlay architecture that securely and autonomously creates VPN tunnels connecting social peers, where online identities and social networking  ...  Trusted collaborative systems require peers to be able to communicate over private, authenticated end-to-end channels.  ...  Drupal content management system, an PGP-signed email exchanges by peers), and an PKI-based IP packet encryption security systems using X.509 certificates.  ... 
doi:10.1016/j.comnet.2009.11.019 fatcat:warkyojabvarjlq7liygcnnkay

The Claim Tool Kit for ad hoc recognition of peer entities

Jean-Marc Seigneur, Christian Damsgaard Jensen
2005 Science of Computer Programming  
at hand due to the large number of peers) challenge the use of legacy authentication mechanisms.  ...  By analysing the evaluation results, the applicability of these advanced Java-based technologies for peer entity recognition is assessed. * Corresponding address: 2850 route nationale,  ...  Acknowledgements We are grateful to the JXTA developers community. This work is sponsored by the European Union, which funds the IST-2001-32486 SECURE project [23] .  ... 
doi:10.1016/j.scico.2004.05.005 fatcat:35ciouzu2ndi7afr7e4eomqcti

SemanticLIFE Collaboration: Security Requirements and Solutions – Security Aspects of Semantic Knowledge Management [chapter]

Edgar R. Weippl, Alexander Schatten, Shuaib Karim, A. Min Tjoa
2004 Lecture Notes in Computer Science  
Haystack (MIT) Haystack uses ontologies for information management [Huynh]. Its ultimate goal is to provide high-quality retrieval.  ...  Primarily it is designed as a single machine single user tool so as to give a psychological illusion of privacy and security.  ...  They have successfully implemented a functional infrastructure for personal and shared information management, based upon semantic web techniques. ePerson project also highlights the fact that peer-to-peer  ... 
doi:10.1007/978-3-540-30545-3_34 fatcat:7fkrrhpmozdntl2mlxmalndv7i

An Experimental Peer-to-Peer E-mail System

Edson Kageyama, Carlos Maziero, Altair Olivo Santin
2008 2008 11th IEEE International Conference on Computational Science and Engineering  
This proposal is inspired from file sharing peer-to-peer systems, in which users locate and retrieve the contents they are looking for.  ...  This paper presents a peerto-peer e-mail system in which messages are sent directly from senders to receivers using a "pull-based" approach.  ...  This service is generally provided by a large amount of peers, allowing to store and retrieve information reliably and efficiently.  ... 
doi:10.1109/cse.2008.9 dblp:conf/cse/KageyamaMS08 fatcat:y5ru75w4wng73dlnae43rujvc4

Passwords in peer-to-peer

Gunnar Kreitz, Oleksandr Bodriagov, Benjamin Greschbach, Guillermo Rodriguez-Cano, Sonja Buchegger
2012 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P)  
In this work, we present a scheme to support logins based on users knowing a username-password pair.  ...  In addition to password logins, we also present supporting protocols to provide functionality related to password logins, such as resetting a forgotten password via e-mail or security questions.  ...  eS i ∀i : peer i , esalt i , ksalt i ← F LI // plaintext part 6: ∀i : send (email, esalt i ) to peer i eK i ← KDF(ksalt i ,email)To provide long-term persistence of this recovery mechanism, K enc  ... 
doi:10.1109/p2p.2012.6335797 dblp:conf/p2p/KreitzBGRB12 fatcat:tu2phvq6cfg2jcvlm255lorsge

Haggle: Seamless Networking for Mobile Applications [chapter]

Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal de Lara, Christophe Diot, Ashvin Goel, Meng How Lim, Eben Upton
2007 Lecture Notes in Computer Science  
We provide a prototype implementation of the Haggle framework and evaluate it by demonstrating support for two existing legacy applications, email and web browsing.  ...  Haggle makes it possible for these applications to seamlessly utilize mobile networking opportunities both with and without infrastructure.  ...  If the peer responds with identity information, it is merged into node's knowledge-base of names. In this way peer nodes can learn identity information even if infrastructure is not available.  ... 
doi:10.1007/978-3-540-74853-3_23 fatcat:mebkmisq2jgrfl4kka6uqfm3me

A pull-based e-mail architecture

Edson Kageyama, Carlos Maziero, Altair Santin
2008 Proceedings of the 2008 ACM symposium on Applied computing - SAC '08  
This proposal is inspired from file sharing peer-topeer systems, in which users locate and retrieve the contents they are looking for. A prototype was built to show the feasibility of the proposal.  ...  E-mail systems operate following a "push-based" approach: the sender side server pushes the e-mails it wants to send to the corresponding receivers' servers.  ...  This service is generally provided by a large amount of peers, allowing to store and retrieve information reliably and efficiently.  ... 
doi:10.1145/1363686.1363802 dblp:conf/sac/KageyamaMS08 fatcat:zzyjnbnkifhlngkjlctuulos5q

Analyzing Big Data Problem Using Hadoop and Cloud Technology

2015 International Journal of Science and Research (IJSR)  
In any kind of industry sector networks they used to share collaboration information which facilitates common interests based information sharing.  ...  We have developed a data intensive technique which is a method of service sharing in corporate networks through cloud based peer to peer data management platform.  ...  The main focus is to add data from different companies (peers) at cloud and efficiently ,securely retrieve the data from cloud and share that with different companies. as the user(peers) grow there should  ... 
doi:10.21275/v4i11.nov151625 fatcat:mui6rfdparbf3enrxxtxljwfpq

Designing Cybersecurity Policies

Shu He, Gene Moo Lee, John S. Quarterman, Andrew B. Whinston
2015 Workshop on the Economics of Information Security  
We use outbound spam volume to estimate latent organizational security levels, then construct peer rankings to compare security levels among organizations in the same industry sectors.  ...  In the present study, we propose a design of an independent security evaluation institution along with regulations on security information disclosure in order to eectively resolve cybersecurity problems  ...  With our peer ranking information available, we provide organizations a convenient way to compare their security levels with their peers, thus enhancing the peer inuence in the security management.  ... 
dblp:conf/weis/HeLQW15 fatcat:tz3annuhwng4hi275opbse7yd4

Agent-Community-Network-Based Secure Collaboration Support System [chapter]

Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ken'ichi Takahashi, Makoto Amamiya
2009 Lecture Notes in Business Information Processing  
Our system requires neither any special administrative facilities nor uploading user data to a special server. It furthermore supports secure peer-to-peer communication between users.  ...  They require special administrative facilities, ask users to upload their data for matching between business needs and seeds, and leave to themselves peer-to-peer communication or negotiation between matched  ...  Acknowledgment This research was partly supported by the Strategic Information and Communications R&D Promotion Program under grant 052310008 from the MIC, Japan.  ... 
doi:10.1007/978-3-642-01668-4_13 fatcat:pnrtciy43nc4dehy4niavwlbtq

When KAD Meets BitTorrent - Building a Stronger P2P Network

Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor
2011 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum  
We investigate the security threats and show that the current BitTorrent Mainline DHT is much more vulnerable to attacks than KAD.  ...  Related work demonstrates that BitTorrent's Mainline DHT is exposed to several identified security issues. In parallel, the KAD DHT has been the core of intense research and was improved over years.  ...  All routing tasks are based on the XOR metric used to evaluate the distance between two peers, or between a peer and a key.  ... 
doi:10.1109/ipdps.2011.318 dblp:conf/ipps/TimpanaroCCF11 fatcat:txwq42psw5fqfmam4wkhk7vad4

Centralized versus peer-to-peer knowledge management systems

Ronald Maier, Thomas Hädrich
2006 Knowledge and Process Management  
The paper then presents two ideal architectures for KMS, a centralized and a peer-to-peer architecture, discusses their differences with the help of two example systems and suggests that each of these  ...  The term knowledge management system (KMS) has been used widely to denote information and communication technologies in support of knowledge management.  ...  Information about users is distributed within Groove or by email.  ... 
doi:10.1002/kpm.244 fatcat:rxqg6q3fvfhx7etonj4jbeakz4

SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOT

Hoda Ramin Hossein
2015 International Journal of Computer Applications Technology and Research  
Doctors using NFC enabled smart phones to retrieve patient information when placed near NFC tag.  ...  This system helps in reducing the paper work required during the registration of the patient and also eliminates the disadvantages of using RFID based system.  ...  For example, if a NFC tag is attached to a poster, the NFC Smartphone can "tap" the tag to access the information stored in the tag easy and conveniently. 3.Peer to Peer mode: A Peer to peer mode enables  ... 
doi:10.7753/ijcatr0412.1015 fatcat:dpyohls2rrb7nk6dyqq2uiqa2y

Application protocol design considerations for a mobile internet

Jörg Ott
2006 Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture - MobiArch '06  
paradigm and augmenting server-based operation by peer-to-peer communications.  ...  temporary disconnections to non-existing end-toend paths.  ...  In effect, the user loses the option to take the next action while retrieval is still in progress (such as selecting the next link to follow or aborting retrieval).  ... 
doi:10.1145/1186699.1186720 fatcat:4cdtushvljfytne53kbgroi42y

Situation-aware trust architecture for vehicular networks

Dijiang Huang, Xiaoyan Hong, Mario Gerla
2010 IEEE Communications Magazine  
Scenario 2: a peer-to-peer information system provides services to its community of drivers.  ...  Moreover, the EMT service will access email servers in each domain to retrieve statistical email data of corresponding registered email accounts.  ...  To this end, we present a policy enforcement system utilizing identity and attributed-based cryptography to achieve group-based data access control.  ... 
doi:10.1109/mcom.2010.5621979 fatcat:6dohtjhqmreafl6vs6qpumqroy
« Previous Showing results 1 — 15 out of 23,888 results