liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
BETA
Turcan, Eduard
Publications (5 of 5) Show all publications
Duma, C., Shahmehri, N. & Turcan, E. (2004). Resilient trust for peer-to-peer based critical information infrastructures. In: Proceedings of the 2nd International Conference on Critical Infrastructures (CRIS 2004). Paper presented at 2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France, October, 2004. Grenoble, France: International Institute for Critical Infrastructure
Open this publication in new window or tab >>Resilient trust for peer-to-peer based critical information infrastructures
2004 (English)In: Proceedings of the 2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France: International Institute for Critical Infrastructure , 2004Conference paper, Published paper (Refereed)
Abstract [en]

Critical information infrastructures (CII) include the information technologies, telecommunication, and the Internet. The protection of CII is a paramount task, as other critical infrastructures (e.g. power grids, banking, and finance) become increasingly dependent on information services. Fault tolerance, scalability, self management, and self healing are some of the main requirements for the information-based critical services. These requirements can be addressed by the emerging peer-to-peer (P2P) technologies. The P2P architectural paradigm distributes the functionality, previously centralized into servers, to all the peers into the network. This approach has the advantage of avoiding bottlenecks and single point of failure making P2P networks robust and resilient to attacks. However, decentralization and distribution of P2P systems raise t he question of trust: how to distinguish the trustworthy peers from malicious ones. In this paper we analyze the resiliency of the existing reputation-based trust management mechanisms and identify the open problems to be addressed in order to provide the degree of resiliency necessary to critical information infrastructures.

Place, publisher, year, edition, pages
Grenoble, France: International Institute for Critical Infrastructure, 2004
Keywords
security, trust, critical information infrastructure, peer-to-peer
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-22754 (URN)2072 (Local ID)2072 (Archive number)2072 (OAI)
Conference
2nd International Conference on Critical Infrastructures (CRIS 2004), Grenoble, France, October, 2004
Available from: 2009-10-07 Created: 2009-10-07 Last updated: 2018-01-13
Turcan, E., Shahmehri, N. & Caronni, G. (2004). Usability and Security for DRM Architectures. In: e-Smart Conference and Demos,2004.
Open this publication in new window or tab >>Usability and Security for DRM Architectures
2004 (English)In: e-Smart Conference and Demos,2004, 2004Conference paper, Published paper (Refereed)
Keywords
DRM, rights management, security
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-22771 (URN)2099 (Local ID)2099 (Archive number)2099 (OAI)
Available from: 2009-10-07 Created: 2009-10-07 Last updated: 2018-01-13
Turcan, E., Strömbäck, L. & Morris, J. (2003). Share it! by bringing P2P into the TV-domain. In: Proceedings of the Third IEEE International Conference on Peer-to-Peer computing.
Open this publication in new window or tab >>Share it! by bringing P2P into the TV-domain
2003 (English)In: Proceedings of the Third IEEE International Conference on Peer-to-Peer computing, 2003Conference paper, Published paper (Refereed)
Abstract [en]

Share it! is a European project with a focus on developing concepts and solutions for interconnecting digital TV set-top boxes that enable users to share TV-programmes. One important goal of the project is to set future standards, e.g. in content management and rights management, for broadband connected digital television.This paper introduces the project objectives and the consortium, and then focuses on how P2P technology and JXTA platform are used in solving various important issues that help to achieve the project goals.

National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-61967 (URN)10.1109/PTP.2003.1231527 (DOI)0-7695-2023-5 (ISBN)
Available from: 2010-11-18 Created: 2010-11-18 Last updated: 2018-01-12
Turcan, E., Shahmehri, N. & Graham, R. L. (2002). Intelligent software delivery using P2P. In: 2nd IEEE International Conference on Peer-to-Peer Computing (pp. 136-143).
Open this publication in new window or tab >>Intelligent software delivery using P2P
2002 (English)In: 2nd IEEE International Conference on Peer-to-Peer Computing, 2002, p. 136-143Conference paper, Published paper (Refereed)
Abstract [en]

Internet has given software providers possibilities for electronic software distribution (ESD). At the same time bandwidth limitations lead to poor performance and scalability of the delivery process. The problem is even harder when delivering large, resource consuming software packages and media content. We propose an agent-based architectural model as amiddleware for intelligent P2P electronic software delivery. In this paper we analyze the possibility of applying the peer-to-peer technology to the process of software delivery, relying on the experience and learned lessons of the related technologies. To this effect we analyze the available material on this topic and identify the important criteria that are crucial for the wide acceptance of ESD by both software providers and end-users. We argue that the proposed model can be used in building a system that meets most, if not all, of the identified criteria. The work presented in this paper opens a number of interesting research issues and investigation opportunities.

National Category
Engineering and Technology
Identifiers
urn:nbn:se:liu:diva-59981 (URN)10.1109/PTP.2002.1046323 (DOI)0-7695-1810-9 (ISBN)
Available from: 2010-10-01 Created: 2010-10-01 Last updated: 2010-10-21
Duma, C., Karresand, M., Shahmehri, N., Caronni, G. & Turcan, E.A trust aware peer-to-peer based overlay architecture for intrusion detection.
Open this publication in new window or tab >>A trust aware peer-to-peer based overlay architecture for intrusion detection
Show others...
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Traditional intrusion detection systems (IDS) are centralized and focused on protecting well bounded network regions. In contrast, current Internet attacks are highly distributed, spanning very large and dispersed regions of the Internet. This renders the deployed intrusion detection approaches inferior and limited in comparison to the attackers' capabilities. In this paper we propose a novel trust-aware peer-to-peer (P2P) based Overlay IDS architecture which is able tocoordinate and concert the detection capabilities of individual and formerly isolated IDSs, thereby increasing the overall effectiveness againstcurrent Internet attacks. The Overlay lDS is fully decentralized, thus avoiding the single point of failure problem characteristic to many other distributed lDS solutions. Moreover, we design an adaptive trust management mechanism which makes the Overlay IDS resilient to possible malicious peers infiltrating the overlay network. We have implemented our proposed Overlay lDS using JXTA P2P framework and we have evaluated its effectiveness for preventing the spread of a real Internet worm over an emulated network. As indicated by the evaluationresults, the use of our Overlay IDS significantly increases the overall survival rate of the network.

National Category
Engineering and Technology
Identifiers
urn:nbn:se:liu:diva-86193 (URN)
Note

This manuscript will not be published.

Available from: 2012-12-10 Created: 2012-12-10 Last updated: 2017-01-17
Organisations

Search in DiVA

Show all publications