Security Infrastructure Research on P2P Applications
ZHAO Ze-liang,CHEN Xing-shu,LIU Yi-he,SHEN Chang-xiang
DOI: https://doi.org/10.3969/j.issn.0490-6756.2006.04.019
2006-01-01
Abstract:As the techniques of P2P(Peer-to-Peer) get expeditious developments and applications,according to the application characteristics of P2P techniques,this thesis gives out the definition of peers,also describes the attributes of them.It establishes the security infrastructure of P2P applications,comes out with a infrastructure with "one core,three layers,four interfaces",so it can provides necessary security services for P2P applications through those four interfaces.And then the thesis describes the layer relationships of the security infrastructure.The establishment of the infrastructure can provide a common platform for P2P applications.This common platform can make universal descriptions of objects in P2P applications systems,make users authentication,implement the unification managements of authorization for all objects,and provide necessary security services.Consequently it can establish an orderable and reliable network environment.