Wiley Web Commerce Security: Design and Development 978-0-470-62446-3 User Manual

Product codes
978-0-470-62446-3
Page of 40
40 
Part I 
 Overview of Commerce
6.  Chakrabarti, A. Grid Computing Security, Springer 2007.
7. 
www.yousendit.com
8.  Stoica, I., et al.,“A Scalable Peer-to-peer Lookup Service for Internet Appli-
cations,” in Proc. ACM SIGCOMM, San Diego, 2001.
9.  Ratnasamy, S., A Scalable Content Addressable networkPh.D. Thesis, University 
of California, Berkeley, 2002.
10. 
http://csrc.nist.gov/rbac/
11. 
http://docs.oasis-open.org/xacml/2.0/access_ 
control-xacml-2.0-core-spec-os.pdf
12. Sybil attacks are the class of attacks where a reputation system is subverted 
by forging identities within a P2P network.
624463c01.indd   40
3/29/11   2:26:37 AM