A survey of DHT security techniques.
Guido UrdanetaGuillaume PierreMaarten van SteenPublished in: ACM Comput. Surv. (2011)
Keyphrases
- information security
- security issues
- intrusion detection
- access control
- network security
- computer security
- distributed systems
- security model
- statistical databases
- security policies
- security problems
- security requirements
- functional requirements
- security threats
- data sets
- data security
- high security
- security mechanisms
- network management
- data sharing
- load balancing
- peer to peer