Professional Documents
Culture Documents
2009 Security
Mega Trends
Survey ,
Ponemon
Institute LLC,
November
2008
Storage
Quota architectures
Distributed auditing
Other forms of fairness
Trust
Trust formation
Trust validation
Dan S. Wallach , “A Survey of Peer-to-Peer Security
Issues”, LNCS 2609, SPRINGER, pp. 42–57, 2003..
A third party can give each client a quota, and refuse access
to the system for any part breaking their quota
The usual goal is to find out who the specific evil sender or
responder is, or what they are transferring.
E Sit, R Morris, Security considerations for peer-to-peer distributed hash tables, Proc. 1st
International Workshop on Peer-to-Peer Systems (2002 - Springer)
EK Lua, J Crowcroft, M Pias, R Sharma, S Lim, A survey and comparison of peer-to-peer overlay
network schemes, IEEE Communications Surveys & Tutorials, 2005