ITU X.1161:2008

ITU X.1161:2008 Framework For Secure Peer-to-peer Communications Specifies security threats and security requirements to the peer-to-peer (P2P) communications based on the service scenarios and characteristics of P2P communications.

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.50 tax incl.

$39.77 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

1Scope
2References
3Definitions
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
4Abbreviations
5Conventions
6ConceptsofP2Pcommunications
6.1BasicP2Pserviceconcept
6.2UnstructuredandstructuredP2Pcommunications
7ServicescenariosofP2Pcommunications
7.1Informationsharingandcontentsdistribution
7.2Communicationplatform
7.3Groupware(Collaboration)
7.4Distributedcomputing
8CharacteristicsofP2Pcommunications
9SecuritythreatstoP2Pcommunications
9.1Eavesdropping
9.2Communicationjamming
9.3Injectionandmodificationofdata
9.4Unauthorizedaccess
9.5Repudiation
9.6Man-in-the-middleattack
9.7Sybilattack
10SecurityrequirementsforP2Pcommunications
10.1Userauthentication
10.2Anonymity
10.3Privacy
10.4Dataintegrity
10.5Dataconfidentiality
10.6Accesscontrol
10.7Non-repudiation
10.8Usability
10.9Availability
10.10Traceability
10.11Trafficcontrol
10.12Relationshipbetweensecurityrequirementsand
securitythreats
11Securityfunctionsforsatisfyingsecurityrequirements
ofP2Pcommunications
11.1Encipherment
11.2Keyexchange
11.3Digitalsignature
11.4Trustmanagement
11.5Accesscontrol
11.6Dataintegritymechanism
11.7Authenticationexchange
11.8Notarization
11.9Securerouting
11.10Trafficcontrolmechanism
11.11IDassignment
11.12Relationshipbetweensecurityrequirementsand
functions
Bibliography

Abstract

Specifies security threats and security requirements to the peer-to-peer (P2P) communications based on the service scenarios and characteristics of P2P communications.

Contact us