1 - Resumo
2 - Principais preocupações
3 - Características da segurança
4 - Uso de Contas e Reputação
 5 - Formação de Espaços Compartilhados e Autenticação
6 - Uso de Chaves de Encriptação
7 - Conclusão
8 - Bibliografia
9 - Perguntas
 Vinicios Franco Iecker Bravo                                Página Inicial


 
 
                                                                     
 
  • [ 1 ] Oram, A., ed., “Peer-to-Peer: Harnessing the Power of Disruptive Technologies”, Sebastopol, CA: O'Reilly & Associates, March 2001

     

    [ 2 ] Milojicic, Dejan S.; Kalogeraki, Vana; Lukose, Rajan; Nagaraja1, Kiran; Pruyne, Jim; Richard, Bruno; Rollins, Sami; Xu, Zhichen., “Peer-to-Peer Computing”, HP Laboratories Palo Alto, March 8th , 2002

     

    [ 3 ] Aberer, Karl; Koubarakis, Manolis; Kalogeraki, Vana (Eds). “Database, Information Systems and Peer-to-Peer Computing”, Springer Science, Business Media Inc., 2005

     

    [ 4 ] Kurose, James F.; Ross, Keith W. “Redes de computadores e a Internet: uma abordagem top-down”; 3. ed. São Paulo; Pearson Addison Wesley, 2006.

     

    [ 5 ] Parameswaran, M; Susarla, A; Whinston, A.B. “P2P networking: an information sharing alternative”. IEEE Computer Magazine. Volume 34; Issue 7; 2001.

     

    [ 6 ] Li Gong. “Peer-to-Peer Networks in Action”. IEEE Internet Computing Magazine. Volume 6, Issue 1; 2002.

     

    [ 7 ] Clarke, I.; Miller, S.G.; Hong, T.W.; Sandberg, O.; Wiley, B. “Protecting free expression online with Freenet”. IEEE Internet Computing Magazine. Volume 6, Issue 1; 2002.

     

    [ 8 ] http://p2p.internet2.edu/

     

    [ 9 ] http://compnetworking.about.com/od/p2ppeertopeer/

     

    [ 10 ] http://p2pnet.net/

     

    [ 11 ] http://www.newscientist.com/article.ns?id=dn3037

 

© copyright 2006 created by www.templatesfreelance.com