PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts pdfsubject=Secure Data Distribution

نویسندگان

  • Marcin Nagy
  • N. Asokan
  • Joerg Ott
چکیده

We present the design and implementation of the PeerShare, a system that can be used by applications to securely distribute sensitive data to social contacts of a user. PeerShare incorporates a generic framework that allows different applications to distribute data with different security requirements. By using interfaces available from existing popular social networks, PeerShare is designed to be easy to use for both end users as well as developers of applications. PeerShare can be used to distribute shared keys, public keys and any other data that need to be distributed with authenticity and confidentiality guarantees to an authorized set of recipients, specified in terms of social relationships. We have used PeerShare already in three different applications and plan to make it available for developers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts

We present the design and implementation of the PeerShare, a system that can be used by applications to securely distribute sensitive data to social contacts of a user. PeerShare incorporates a generic framework that allows different applications to distribute data with different security requirements. By using interfaces available from existing popular social networks, PeerShare is designed to...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns

Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns E. Ghorbanian, M.A. T. PourEbrahim, Ph.D. P.S. Seyed Mousavi, Ph.D.   M. Habibi, Ph.D. This study was undertaken to compare social adjustment and academic achievement of female children with secure and insecure attachment patterns. The research type was descript...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

Secure Information Sharing∗ A Final Report submitted to Network Information and Space Security Center (NISSC) for Spring 2004 Sponsored Project

The objective of the proposal is to examine the existing security models for supporting information sharing among multiple agencies and suggest extension for addressing the new requirement. Procedures for enforcing and tracking secure information distribution will be investigated. Existing group key management will be enhanced to address the scaling and tracking issues. To validate the revised ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013