scholarly journals The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond

Author(s):  
Christian Grothoff
Author(s):  
Anil Kumar Budati ◽  
George Ghinea ◽  
Dileep Kumar Yadav ◽  
Hafeez Basha Ranipet

Author(s):  
Jens O. Oberender ◽  
Frank-Uwe Andersen ◽  
Hermann de Meer ◽  
Ivan Dedinski ◽  
Tobias Hoßfeld ◽  
...  

2011 ◽  
pp. 1-27 ◽  
Author(s):  
Detlef Schoder ◽  
Kai Fischbach ◽  
Christian Schmitt

This chapter reviews core concepts of peer-to-peer (P2P) networking. It highlights the management of resources, such as bandwidth, storage, information, files, and processor cycles based on P2P networks. A model differentiating P2P infrastructures, P2P applications, and P2P communities is introduced. This model provides a better understanding of the different perspectives of P2P. Key technical and social challenges that still limit the potential of information systems based on P2P architectures are discussed.


Author(s):  
Surya B. Yadav

The extent methods largely ignore the importance of integrating security requirements with business requirements and providing built-in steps for dealing with these requirements seamlessly. To address this problem, a new approach to secure network analysis and design is presented. The proposed method, called the SEACON method, provides an integrated approach to use existing principles of information systems analysis and design with the unique requirements of distributed secure network systems. We introduce several concepts including security adequacy level, process-location-security matrix, datalocation- security matrix, and secure location model to provide built-in mechanisms to capture security needs and use them seamlessly throughout the steps of analyzing and designing secure networks. This method is illustrated and compared to other secure network design methods. The SEACON method is found to be a useful and effective method.


Sign in / Sign up

Export Citation Format

Share Document