P2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science and Research Branch,Islamic Azad University
2017-05-01
|
Series: | Journal of Advances in Computer Engineering and Technology |
Subjects: | |
Online Access: | http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdf |
Summary: | Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments. |
---|---|
ISSN: | 2423-4192 2423-4206 |