Team for Research in
Ubiquitous Secure Technology

Role based access control and the JXTA peer-to-peer framework
Mark Stamp, Amit Mathur, Suneuy Kim

Citation
Mark Stamp, Amit Mathur, Suneuy Kim. "Role based access control and the JXTA peer-to-peer framework". Proceedings of 2006 International Conference on Security & Management, June, 2006.

Abstract
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a security mechanism for a single host at the operating system level. This allows the operating system to ensure that authenticated users have access to resources based on their assigned roles. RBAC is more challenging in peer-to-peer (P2P) systems, due to the lack of centralized administration. In this paper we discuss RBAC over a P2P network and we present an RBAC implementation in the JXTA P2P framework. JXTA is a popular open P2P technology specification.

Electronic downloads

Citation formats  
  • HTML
    Mark Stamp, Amit Mathur, Suneuy Kim. <a
    href="http://www.truststc.org/pubs/238.html"
    >Role based access control and the JXTA peer-to-peer
    framework</a>, Proceedings of 2006 International
    Conference on Security & Management, June, 2006.
  • Plain text
    Mark Stamp, Amit Mathur, Suneuy Kim. "Role based access
    control and the JXTA peer-to-peer framework".
    Proceedings of 2006 International Conference on Security
    & Management, June, 2006.
  • BibTeX
    @inproceedings{StampMathurKim06_RoleBasedAccessControlJXTAPeertopeerFramework,
        author = {Mark Stamp and Amit Mathur and Suneuy Kim},
        title = {Role based access control and the JXTA
                  peer-to-peer framework},
        booktitle = {Proceedings of 2006 International Conference on
                  Security \& Management},
        month = {June},
        year = {2006},
        abstract = {Role based access control (RBAC) allows users
                  access to resources based on their competencies
                  and responsibilities within an organization.
                  Typically, RBAC is provided as a security
                  mechanism for a single host at the operating
                  system level. This allows the operating system to
                  ensure that authenticated users have access to
                  resources based on their assigned roles. RBAC is
                  more challenging in peer-to-peer (P2P) systems,
                  due to the lack of centralized administration. In
                  this paper we discuss RBAC over a P2P network and
                  we present an RBAC implementation in the JXTA P2P
                  framework. JXTA is a popular open P2P technology
                  specification.},
        URL = {http://www.truststc.org/pubs/238.html}
    }
    

Posted by Mark Stamp on 23 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.