CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations   
 5     Conventions     
 6     Concepts of P2P communications
        6.1     Basic P2P service concept 
        6.2     Unstructured and structured P2P communications   
 7     Service scenarios of P2P communications
        7.1     Information sharing and contents distribution           
        7.2     Communication platform    
        7.3     Groupware (Collaboration)
        7.4     Distributed computing        
 8     Characteristics of P2P communications    
 9     Security threats to P2P communications   
        9.1     Eavesdropping       
        9.2     Communication jamming    
        9.3     Injection and modification of data   
        9.4     Unauthorized access          
        9.5     Repudiation           
        9.6     Man-in-the-middle attack  
        9.7     Sybil attack           
10     Security requirements for P2P communications    
       10.1     User authentication           
       10.2     Anonymity
       10.3     Privacy  
       10.4     Data integrity        
       10.5     Data confidentiality           
       10.6     Access control      
       10.7     Non-repudiation   
       10.8     Usability
       10.9     Availability
      10.10     Traceability          
      10.11     Traffic control      
      10.12     Relationship between security requirements and security threats    
11     Security functions for satisfying security requirements of P2P communications       
       11.1     Encipherment        
       11.2     Key exchange       
       11.3     Digital signature    
       11.4     Trust management 
       11.5     Access control      
       11.6     Data integrity mechanism   
       11.7     Authentication exchange    
       11.8     Notarization          
       11.9     Secure routing      
      11.10     Traffic control mechanism
      11.11     ID assignment      
      11.12     Relationship between security requirements and functions  
Bibliography