منابع مشابه
Peer-to-Peer Security
Peer-to-peer networks break the dominant network paradigm of client-server relationships in information exchange by allowing heterogeneous multipurpose machines to interact and share functionality. Like any architecture, different systems have different purposes and necessitate different security protections. This chapter will identify several key features of peer-to-peer networks and the secur...
متن کاملMultimedia Security in Peer-to-Peer Networks
This Master thesis is a contribution to develope Multimedia security mechanisms for various P2P file sharing environments. Objective of this research thesis is to design a software tool for Multimedia business environments to fight against the copyright infringement in various P2P file sharing networks. In order to fulfil this objective, a combined implementation of two independent mechanisms d...
متن کاملSecurity applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propose the use of a peer-to-peer architecture whereby each peer is responsible for: (a) detecting whether a virus or worm is uncontrollably propagating through the network resulting in an epidemic; (b) automatically dispat...
متن کاملPeer-to-peer Networks: Security Analysis
In this work we’re dealing with security in highly distributed systems, specifically peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. Classification of attacks realizable in peer-to-peer networks is given. We also discuss influences of their combinations. This could be useful for creating mod...
متن کاملPeer-to-Peer Security and Intels Peer-to-Peer Trusted Library
The peer-to-peer computing model is not new, but has recently become a commonplace among the average computer user due to the introduction of applications like Napster and Gnutella. Along with the freedom of connecting peer-to-peer come security risks. In response to some of these security risks, Intel has released a code library that software developers can use to strengthen the security of, a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2006
ISSN: 1536-1233
DOI: 10.1109/tmc.2006.12