Wiley Web Commerce Security: Design and Development 978-0-470-62446-3 User Manual
Product codes
978-0-470-62446-3
40
Part I
■
Overview of Commerce
6. Chakrabarti, A. Grid Computing Security, Springer 2007.
7.
7.
www.yousendit.com
8. Stoica, I., et al.,“A Scalable Peer-to-peer Lookup Service for Internet Appli-
cations,” in Proc. ACM SIGCOMM, San Diego, 2001.
9. Ratnasamy, S., A Scalable Content Addressable network, Ph.D. Thesis, University
of California, Berkeley, 2002.
10.
http://csrc.nist.gov/rbac/
11.
http://docs.oasis-open.org/xacml/2.0/access_
control-xacml-2.0-core-spec-os.pdf
control-xacml-2.0-core-spec-os.pdf
12. Sybil attacks are the class of attacks where a reputation system is subverted
by forging identities within a P2P network.
624463c01.indd 40
3/29/11 2:26:37 AM