Show simple item record

dc.contributor.authorArnedo Moreno, Joan
dc.contributor.authorMatsuo, Keita
dc.contributor.authorBarolli, Leonard
dc.contributor.authorXhafa Xhafa, Fatos
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament de Ciències de la Computació
dc.date.accessioned2018-05-31T08:25:24Z
dc.date.available2018-05-31T08:25:24Z
dc.date.issued2009
dc.identifier.citationArnedo, J., Matsuo, K., Barolli, L., Xhafa, F. Securing a Java P2P framework: The JXTA-Overlay case. A: International Conference on Information Integration and Web-based Applications & Services. "iiWAS 2009: the 11th International Conference on Information Integration and Web-based Applications & Services: Kuala Lumpur, Malasia: 14-16 December, 2009". New York: Association for Computing Machinery (ACM), 2009, p. 160-167.
dc.identifier.urihttp://hdl.handle.net/2117/117661
dc.description.abstractIn the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system. Unfortunately, some systems' design focus targeted issues such as scalabil-ity or overall performance, but not security. As a result, security mechanisms must be provided at a later stage, after the system has already been designed and partially (or even fully) implemented, which may prove a cumbersome proposition. This work exposes how a security layer was provided under such circumstances for a specic Java based P2P framework: JXTA-Overlay
dc.format.extent8 p.
dc.language.isoeng
dc.publisherAssociation for Computing Machinery (ACM)
dc.subjectÀrees temàtiques de la UPC::Informàtica::Arquitectura de computadors::Arquitectures distribuïdes
dc.subject.lcshPeer-to-peer architecture (Computer networks)
dc.subject.lcshComputer networks -- Security measures
dc.subject.otherJXTA
dc.subject.otherJava
dc.subject.otherSecurity
dc.subject.otherXMLdsig
dc.subject.otherXMLenc
dc.subject.otherPeer-to-Peer
dc.titleSecuring a Java P2P framework: The JXTA-Overlay case
dc.typeConference report
dc.subject.lemacXarxes punt a punt (Xarxes d'ordinadors)
dc.subject.lemacOrdinadors, Xarxes d' -- Mesures de seguretat
dc.identifier.doi10.1145/1806338.1806373
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttps://dl.acm.org/citation.cfm?id=1806373
dc.rights.accessOpen Access
local.identifier.drac17978842
dc.description.versionPostprint (author's final draft)
local.citation.authorArnedo, J.; Matsuo, K.; Barolli, L.; Xhafa, F.
local.citation.contributorInternational Conference on Information Integration and Web-based Applications & Services
local.citation.pubplaceNew York
local.citation.publicationNameiiWAS 2009: the 11th International Conference on Information Integration and Web-based Applications & Services: Kuala Lumpur, Malasia: 14-16 December, 2009
local.citation.startingPage160
local.citation.endingPage167


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder