Flexible Security Configuration & Deployment in Peer-to-Peer Applications.
André DetschLuciano Paschoal GasparyMarinho P. BarcellosRicardo Nabinger SanchezPublished in: NOMS (2006)
Keyphrases
- peer to peer
- information security
- network security
- resource discovery
- security systems
- data sharing
- peer to peer systems
- intrusion detection
- computer security
- security protocols
- overlay network
- security issues
- information assurance
- dynamic reconfiguration
- peer to peer networks
- security mechanisms
- statistical databases
- security policies
- distributed computing
- ad hoc networks
- encryption scheme
- fault tolerance
- security analysis
- operating system
- access control
- information systems
- security level
- security properties
- security problems
- security measures
- social networks
- database