Keyphrases
- peer to peer
- security problems
- security concerns
- security issues
- lessons learned
- authentication and key agreement
- real world
- resource discovery
- security requirements
- access control
- digital libraries
- peer to peer networks
- security policies
- statistical databases
- intrusion detection
- intelligence community
- security threats
- security and privacy issues
- data security
- overlay network
- security mechanisms
- distributed computing
- distributed environment
- file sharing
- peer to peer systems
- data sharing
- ad hoc networks
- computing infrastructure
- load balancing
- information systems