Table of Contents
1Scope
2References
3Definitions
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
4Abbreviationsandacronyms
5Conventions
6Conceptualarchitectureofoverlaynetwork
7Securityarchitectureofthepeer-to-peernetwork
7.1Peer-to-peerarchitecturalreferencemodel
7.2RelationshipbetweentheP2Poverlaystratumand
transportationstratum
8Primitiveoperationsofthepeer-to-peernetwork
8.1Join
8.2Leave
8.3Search
8.4Chat
8.5Routing
8.6InsertionandRetrieval
8.7UpdateandDelete
8.8Multicasting
8.9Relationshipbetweensecurityrequirementsandoperations
8.10Relationshipbetweensecurityfunctionsandoperations
AnnexA-Structuresofpeer-to-peernetworks
A.1Centralizedpeer-to-peernetworks
A.2Pure(distributed)peer-to-peernetworks
A.3Hybridpeer-to-peernetworks
A.4DHT(distributedhashtable)-basedpeer-to-peer
networks[b-ES05]
Bibliography Abstract
Specifies a general security-related architectural model which can be applied in various peer-to-peer (P2P) networks.