|
[1]Gnutella. Website: http://www.gnutella.com. [2]SPKI / SDSI certificates. http://world.std.com/.cme/html/spki.html. [3]S. Androutsellis-Theotokis and D. Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computer Survey, 36(4):335–371, 2004. ACM Press, New York, USA. [4]R. Chen and W. Yeager. Poblano: A distributed trust model for peer-to-peer networks. Sun Microsystems. http://www.jxta.org/docs/trust.pdf. [5]I. Clarke, O. Sandberg, and B. Wiley. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000. [6]N. Daswani, H. Garcia-Molina, and B. Yang. Open problems in data-sharing peer-to-peer systems. In ICDT 2003. [7]E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02), Vienna, Austria, July 2002. [8]A. Hess, J. Holt, J. Jacobson, and K. E. Seamons. Content-triggered trust negotiation. ACM Transactions on Information and System Security (TISSEC), 7(3):428–456, August 2004. [9]A. Hess and K. E. Seamons. An access control model for dynamic client-side content. In the 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Villa Gallia, Como, Italy, June 2003. ACM. [10]M. Kaminsky, G. Savvides, D. Mazi`eres, and M. F. Kaashoek. Decentralized user authentication in a global file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03), pages 60–73, Bolton Landing, New York, October 2003. [11]S. Lee, R. Sherwood, and B. Bhattacharjee. Cooperative peer groups in nice. In Proceedings of IEEE INFOCOM 2003, San Franciso, CA, April 2003. [12]S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. D. Keromytis, and J. M. Smith. Secure and flexible global file sharing. In Proceedings of the USENIX 2003 Annual Technical Conference, pages 165–178, San Antonio, Texas, June 2003. [13]M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. In 1st International Conference on Peer-to-Peer Computing (P2P 2001), Linköping, Sweden, Auguest 2001. [14]R. L. Rivest and B. Lampson. SDSI: A simple distributed security infrastructure. http://theory.lcs.mit.edu/.cis/sdsi.html. [15]T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In Proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden. [16]R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pages 147–158, Stockholm, Sweden, 2005. ACM Press. [17]Y. Wang and J. Vassileva. Trust and reputation model in peer-to-peer networks. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), Linköping, Sweden, September 2003. [18] P. R. Zimmermann. The Official PGP User’s Guide. MIT Press, 1995.
|