Keyphrases
- peer to peer
- access control
- overlay network
- resource discovery
- security requirements
- intrusion detection
- security issues
- information security
- digital libraries
- security management
- fault tolerance
- distributed environment
- client server
- network security
- security policies
- load balancing
- security measures
- multimedia
- data security
- security protocols
- security threats
- security problems
- peer to peer systems
- information assurance
- data integrity
- peer to peer networks
- functional requirements
- statistical databases
- distributed computing
- quality of service
- cloud computing