Title
Role-based access control for collaborative enterprise in peer-to-peer computing environments
Abstract
In Peer-to-Peer (P2P) computing environments, each participant (peer) acts as both client and content provider. This satisfies the requirement that resources should be increasingly made available by being published to other users from a user's machine. Compared with services performed by the client-server model, P2P-based services have several advantages. However, wide-scale application of P2P computing is constrained by limitations associated with the especially sophisticated control mechanisms needed between peers. To overcome these limitations, we introduce a controlled P2P computing architecture by extending the concept of Web services to the peer-to-peer level through a generic middleware. Specifically, in this paper we tailor our approach to support RBAC. Although our approach supports both brokered and purist P2P models, all of the policy decisions can be made on the peer side, because policy information is transferred from the policy servers to the corresponding peers through metadata that peers can understand. Each peer makes the access control decision based on the enterprise, the community, and the peer policies without asking other components. This approach supports RBAC services for collaborative enterprise in P2P computing environments, not only within one community but also within inter-communities. Furthermore, it also supports peers' autonomous decisions without causing policy conflicts. The broad dissemination of our approach would enable P2P technology to be applicable to more reliable and efficient services, providing controlled communications between peers.
Year
DOI
Venue
2003
10.1145/775412.775424
SACMAT
Keywords
Field
DocType
policy server,p2p computing architecture,p2p computing,policy conflict,p2p computing environment,policy decision,collaborative enterprise,role-based access control,peer-to-peer computing environment,corresponding peer,p2p technology,policy information,p2p model,satisfiability,security,computer architecture,web service,access control,middleware,role based access control,client server,p2p,service provider
Middleware,Metadata,World Wide Web,Computer science,Computer security,Server,Computing architecture,Peer to peer computing,Role-based access control,Access control,Web service
Conference
ISBN
Citations 
PageRank 
1-58113-681-1
33
1.47
References 
Authors
7
2
Name
Order
Citations
PageRank
Joon S. Park152952.78
Junseok Hwang224131.09