• International journal on advances in internet technology. 2008- • Information systems frontiers. 2013-. [Online ed.]. Netherlands: Kluwer Online • TheScientificWorldjournal. 2012-. Boynton Beach (FL): Scientific World
C.04 Editorial board of an international magazine
Project results helped us to obtain new EU projects in the area of information security. Members of the project team were successful in calls in the EU FP7 (security), CIP (competitiveness and innovation) and ISEC (cybercrime) with five project proposals, one of them (COURAGE) being top-ranked among more than 100 proposals. These are: • ReDIRNET, FP7 SECURITY CALL • COURAGE, FP7. SECURITY CALL • D-FET, ISEC, DG-HOME • STORK 2.0 (CIP) • E-SENS (CIP)
D.01 Chairing over/coordinating (international and national) projects
The paper on the enhancement of the Closed Swarms protocol that enables access control in P2P networks received the best papers award at the SecureWare 2011 conference.
E.02 International awards
COBISS.SI-ID: 24977959In the project a protocol named Enhanced Closed Swam protocol was designed and developed. The protocol provides flexible and distributed access control mechanisms for peer-to-peer systems and protects the content provisioning system resources from unauthorized usage. The protocol has been submitted to the Internet Engineering Task Force (IETF) WG on Peer to Peer Streaming (PPSP). The WG has published the document in the WG charter as draft standard. The submitted document answers most of the PPSP charter security requirements and fills a decade old gap in the P2P content delivery technologies. Besides, as the requirement to protect the P2P content delivery from unauthorized usage was one of the most exposed professional content providers requirement the submitted document answers to the set requirements. The draft describes how to implement the access control security mechanisms like users authentication, distributed access control policies, data origin authentication, integrity and confidentiality services, prevention of security threats like replay attacks, and mechanisms for swarm trust management. The protocol specifies also how to be used with the core Peer to Peer Streaming Peer Protocol (PPSPP).
F.31 Development of standards