Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security
Titel:
Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security
Auteur:
Thyer, Mark
Verschenen in:
Information security journal
Paginering:
Jaargang 12 (2003) nr. 5 pagina's 42-51
Jaar:
2003-11-01
Inhoud:
In the early days of the Internet, most computers had a clearly defined role: storage, computation, management, and identity were all responsibilities relegated to servers. This was due primarily to the fact that servers were capable of supporting these functions, and personal computers were capable of little more than running a browser. Additionally, servers were given a static address and name, and maintained a persistent connection to the Internet. In contrast to servers, most Internet-connected personal computers did not have a static identity on the Internet. That is, personal computers did not maintain a regular IP address, name, or persistent presence on the Internet. Based on the unreliable presence of personal computers on the Internet, these machines were incapable of sharing their computing resources to actively participate as a component of a larger system.