XML-based security for JXTA core protocols
نویسندگان
چکیده
منابع مشابه
XML-based security for JXTA core protocols
JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a satisfactory method that provides security services to the core protocols: privacy, authenticity, integrity and nonrepudiation. The presented mechanisms are fully distributed a...
متن کاملSecurity Based Heuristic SAX for XML Parsing
XML based services integrate information resources running on different platforms or technologies to enhance the service efficiency. Thus, the volume of XML traffic on networks is increasing rapidly, and it demands for efficient XML processing algorithms to support high performance services, especially in XML security applications. This paper proposes a memory efficient XML parsing algorithm le...
متن کاملA View Based Security Framework for XML
As science communities and commercial organisations increasingly exploit XML as a means of exchanging and disseminating information, the selective exposure of information in XML has become an important issue. In this paper, we present a novel XML security framework developed to enforce a generic, flexible access-control mechanism for XML data management, which supports efficient and secure quer...
متن کاملTrust-Based Security Protocols
An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents
متن کاملAn XML-based Security Management Model for Multilevel Security Databases
This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges, controls, and manages the new and inherent low-level access control attributes based on Rule-Based Algorithm ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Autonomic Computing
سال: 2010
ISSN: 1741-8569,1741-8577
DOI: 10.1504/ijac.2010.037517