[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...
From: |
Hermanni Hyytiälä |
Subject: |
[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert... |
Date: |
Mon, 03 Mar 2003 05:49:56 -0500 |
CVSROOT: /cvsroot/gzz
Module name: gzz
Changes by: Hermanni Hyytiälä <address@hidden> 03/03/03 05:49:55
Modified files:
Documentation/misc/hemppah-progradu: masterthesis.tex
progradu.bib
Log message:
More trust
CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/masterthesis.tex.diff?tr1=1.102&tr2=1.103&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/progradu.bib.diff?tr1=1.89&tr2=1.90&r1=text&r2=text
Patches:
Index: gzz/Documentation/misc/hemppah-progradu/masterthesis.tex
diff -u gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.102
gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.103
--- gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.102 Mon Mar
3 05:17:31 2003
+++ gzz/Documentation/misc/hemppah-progradu/masterthesis.tex Mon Mar 3
05:49:55 2003
@@ -1051,10 +1051,17 @@
\subsection{Trust, data authenticity and integrity}
+Currently, trust in Peer-to-Peer systems is based on \emph{reputation}.
Current repuation methods focus either
+on the semantic properties, or data management properties of the trust model.
Some research has been
+done on reputation models in Peer-to-Peer systems, such as
\cite{aberer01trust}. Implementations
+include Advogato \cite{advogatourl}. None of the current proposals or
implementations based on reputation address trust
+in a trustworthy way.
+
+Optimal solution for trust in Peer-to-Peer systems would be certificate based
security methods.
Quite recently, widely used Public Key Infrastructure (PKI) has been deployed
in distributed
systems \cite{rivest96sdsi}, \cite{spkiworkinggroup}. PKI is an reliable
technology for securing
data in rather \emph{static} computing systems, such as in the Internet.
However, in Peer-to-Peer
-network, the problem of PKI-based security mechanism is the maintenance of the
keys as participating
+network, the problem of key based security mechanism is the maintenance of the
keys as participating
peer constantly join and leave the system. Specifically, the distribution of
key changes comes an essential
problem in ad hoc enviroments. These include revokation of keys and new key
distribution. Also, the scenario
in which hostile peers are present has to be addressed.
@@ -1064,6 +1071,12 @@
features of PKI to be fully usable yet. Furthermore, the hierarchy of
SDSI/SPKI may a problem for
Peer-to-Peer systems, in which hierarchy is intentionally missing.
+For data integrity, on the other hand, there are few working solutions.
Cryptographic content hashes,
+such as \cite{fips-sha-1}, variations \cite{merkle87hashtree} and their
implementation techniques \cite{mohr02thex},
+are efficient and reliable methods for identifying the integrity of data in
Peer-to-Peer systems. One
+possible application of cryptographic content hashes may in peer identifier
creation process, in which
+IP address of peer can be verified by the other peer. This is one form of
\emph{self-certifying data}.
+
\subsection{Anonymity}
Anonymoys \cite{352607}
@@ -1080,7 +1093,7 @@
\cite{sit02securitycons}
-\cite{aberer01trust}
+
\cite{ajmani02conchord}
Index: gzz/Documentation/misc/hemppah-progradu/progradu.bib
diff -u gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.89
gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.90
--- gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.89 Mon Mar 3
05:17:31 2003
+++ gzz/Documentation/misc/hemppah-progradu/progradu.bib Mon Mar 3
05:49:55 2003
@@ -2026,4 +2026,20 @@
url = {http://www.ietf.org/html.charters/spki-charter.html}
}
address@hidden,
+ title = {Advogato Trust Metric},
+ key = {Advogato Trust Metric},
+ url = {http://advogato.org/trust-metric.html}
+}
address@hidden,
+ key = {Khashmir},
+ title ={Khashmir},
+ url = {http://khashmir.sourceforge.net/}
+}
+
address@hidden,
+ title ={Mixminion},
+ key = {Mixminion},
+ url ={http://www.mixminion.net/}
+}
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/03
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/03
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/03
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...,
Hermanni Hyytiälä <=
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/03
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/03
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/04
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/04
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/04
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/04
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/04
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/04
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/05
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert..., Hermanni Hyytiälä, 2003/03/05