An Access Control Protocol for Peer-to-Peer Applications using Asymmetric Cryptography.
Sebastian VoigtPublished in: GI Jahrestagung (1) (2006)
Keyphrases
- access control
- peer to peer
- security model
- dynamic access control
- data security
- fine grained
- security policies
- lightweight
- access control models
- security mechanisms
- access control policies
- role based access control
- access control mechanism
- role assignment
- security requirements
- digital libraries
- load balancing
- security analysis
- third party
- client server
- access control systems
- identity management
- content sharing
- data protection
- wireless sensor networks
- rbac model
- directory service
- distributed environment
- computer networks
- ad hoc networks
- data sharing