An identity-based approach to secure P2P applications with Likir.
Luca Maria AielloMarco MilanesioGiancarlo RuffoRossano SchifanellaPublished in: Peer-to-Peer Netw. Appl. (2011)
Keyphrases
- identity management
- peer to peer
- trust relationships
- security issues
- access control
- authentication scheme
- resource discovery
- personal information
- security mechanisms
- data sharing
- file sharing
- lightweight
- peer to peer computing
- security requirements
- peer to peer systems
- security level
- distributed environment
- distributed network
- covert channel