Enterprise Strength Security on a JXTA P2P Network.
Bill YeagerPublished in: Peer-to-Peer Computing (2003)
Keyphrases
- peer to peer
- enterprise network
- policy enforcement
- security threats
- access control
- security protection
- distributed network
- virtual private network
- security issues
- security management
- cyber attacks
- intrusion detection
- enterprise systems
- network management
- wireless sensor networks
- small world
- communication networks
- trust relationships
- information security
- network monitoring
- buffer overflow
- trust management
- unstructured peer to peer
- application level
- network traffic
- file sharing
- computer networks
- web services
- response time
- knowledge management
- load balancing
- complex networks
- network connection
- super peer
- ad hoc networks
- network model
- data sharing
- security policies
- security mechanisms
- network resources
- peer to peer networks
- network bandwidth