Keyphrases
- peer to peer
- trust relationships
- trust management
- security services
- trusted computing
- trust model
- computer security
- trust negotiation
- information security
- peer to peer networks
- ad hoc networks
- network security
- digital libraries
- overlay network
- distributed computing
- security protocols
- access control
- reputation mechanisms
- security requirements
- trust evaluation
- public key infrastructure
- security mechanisms
- security management
- internet banking
- security issues
- statistical databases
- intrusion detection
- security threats
- resource discovery
- information systems
- privacy concerns
- security policies
- privacy preserving
- policy enforcement
- automated trust negotiation