2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN) 2017
DOI: 10.1109/lanman.2017.7972147
|View full text |Cite
|
Sign up to set email alerts
|

Access control for secure distributed data structures in Distributed Hash Tables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Selected elements of LibreSocial have been partially published before and reached very positive reaction in the community, corresponding dissertations 21,49,58,63 around LibreSocial elaborate on specific elements, such as the overlay, the storage and the monitoring. This is the first in detail overview on the overall architecture and interdependencies of the elements.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Selected elements of LibreSocial have been partially published before and reached very positive reaction in the community, corresponding dissertations 21,49,58,63 around LibreSocial elaborate on specific elements, such as the overlay, the storage and the monitoring. This is the first in detail overview on the overall architecture and interdependencies of the elements.…”
Section: Resultsmentioning
confidence: 99%
“…As the access control is enforced by the P2P framework, the applications and plugins do not have to hassle with the complexity of the access control enforcement. In the dissertation, 58 we present the DDS concept in full detail.…”
Section: The P2p Frameworkmentioning
confidence: 99%
“…When a new node is entered, three properties must be retained [ 16 , 21 ]: The successor of each node must point correctly to the next one Each key k must be stored by the successor ( k ) …”
Section: The Proposed Systemmentioning
confidence: 99%
“…The operation of the individual applications, subsystems, and solutions consisting of the distinct parts of the information system ensure that the greatest possible uniformity is achieved in the interfaces between the different subsystems and in the way they operate, and common and friendly presentation modes will be chosen in terms of user interfaces, with applications and system scalability to be ensured. Also, the use of flexible management systems allows the functional control of the large volume of data, the increased availability of the system, and the possibility of controlling access to the data [ 3 , 21 ].…”
Section: The Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation