【24h】

Enterprise strength security on a JXTA P2P network

机译:JXTA P2P网络上的企业强度安全性

获取原文

摘要

Summary form only given. When one begins to think about security and P2P networks, and in particular, ad-hoc P2P networks with no real centralization, there are potentially billions of peer nodes, all possibly vulnerable to attack in a multitude of ways: Impersonation attacks and thus identity theft by unauthorized or falsely authorized parties; Invasion of privacy and all that that carries with it; Loss of data integrity; We imagine the equivalent of antimatter, a complete negation of the fundamental principles of security, or the antisecure net. Those among us with a strong interest in the secure net, and making P2P not only an accepted but preferred way of both doing business in the enterprise as well as protecting the personal privacy of the innocent users of P2P software require a toolbox with sockets, and a socket wrench that is capable of applying the torque that is appropriate to each scenario we wish to secure. It is easy enough for each peer node to be its own certificate authority, create its own root and service certificates, distribute the root certificate out-of-band or in some cases inband, different sockets for different scenarios, and then use transport layer security to insure two way authorization and privacy. Another socket that can be used by small communities of peers to assure that the public keys that they distribute can be trusted with some degree of certainty based on the reputation of the signers. Finally, without actually using a recognized CA, one can apply even more torque to tighten the security on a P2P network. Select one or more well protected and trusted systems, and give to them certificate-granting authority. These systems are unlike standard CAs in the sense that they are peers in the P2P Network. To acquire a certificate the peer must be authorized perhaps by using an LDAP directory with a recognized protected password. Here, the CA can also use a secure connection to a corporate LDAP service to authorize requesting peers. In the end, each of the above scenarios, each socket in our mythical toolbox, is a not so mythical. This is how Project JXTA approaches security, and what we will discuss in this keynote presentation.
机译:仅提供摘要表格。当人们开始考虑安全性和P2P网络,尤其是没有真正集中化的即席P2P网络时,潜在的数十亿个对等节点都可能以多种方式受到攻击:模拟攻击和身份盗用未经授权或错误授权的各方;侵犯隐私及其带来的一切;丢失数据完整性;我们想像的是反物质,完全否定了安全的基本原理,或者说是反安全网。我们当中那些对安全网络怀有浓厚兴趣的人,不仅使P2P成为企业开展业务以及保护P2P软件无辜用户的个人隐私的一种既被接受但首选的方式,还需要一个带有插座的工具箱,并且套筒扳手,能够施加适合于我们希望固定的每种情况的扭矩。每个对等节点很容易成为自己的证书颁发机构,创建自己的根证书和服务证书,将根证书带外分发(在某些情况下为带内分发),针对不同情况使用不同的套接字,然后使用传输层安全性确保两种方式的授权和隐私。小型套接字的对等社区可以使用另一个套接字来确保可以根据签名者的信誉在一定程度上确定信任它们分发的公共密钥。最后,无需实际使用公认的CA,就可以施加更大的扭矩来加强P2P网络上的安全性。选择一个或多个受到良好保护和信任的系统,并授予它们证书颁发机构的权限。从它们在P2P网络中是对等的意义上说,这些系统与标准CA不同。要获得证书,必须使用具有公认的受保护密码的LDAP目录来授权对等方。在此,CA还可以使用与公司LDAP服务的安全连接来授权发出请求的对等方。最后,上述每种情况(我们的神话工具箱中的每个插座)都不是那么神话。这就是Project JXTA处理安全性的方式,以及我们将在本主题演讲中讨论的内容。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号