Keyphrases
- peer to peer
- rights management
- data sharing
- scalable distributed
- peer to peer computing
- security issues
- overlay network
- security requirements
- file sharing
- media streaming
- resource discovery
- security mechanisms
- sensitive data
- efficient implementation
- standard model
- trust management
- user authentication
- security level
- authentication scheme
- method invocation
- lightweight