Title :
An Algorithm of Constructing Certificates Chain for Trusted P2P Network
Author :
Hui, Yin ; Jicheng, Liu ; Yuhua, Wang ; Dexian, Zhang
Author_Institution :
Sch. of Inf. Sci. & Technol., Henan Univ. of Technol., Zhengzhou, China
Abstract :
Because of the authentication and authorization based on CA use the centralized control, it is difficult for P2P network. In P2P network, DHT is a good way to search a required certificate, but it is not efficient for constructing the certificate chains including many certificates. This paper proposes a measure of constructing the certificate chain based on the trusted group of points in p2p network. Compared with DHT, It is more efficient because it adopts the structural overlay network in the small world to construct the authorization and authentication certificate chain.
Keywords :
Access control; Authentication; Authorization; Centralized control; Certification; Computer networks; Electronic mail; Information science; Peer to peer computing; Springs; Authentication; Authorization; Certifications Chain; P2P; Trusted;
Conference_Titel :
Challenges in Environmental Science and Computer Engineering (CESCE), 2010 International Conference on
Conference_Location :
Wuhan, China
Print_ISBN :
978-0-7695-3972-0
Electronic_ISBN :
978-1-4244-5924-7
DOI :
10.1109/CESCE.2010.221