Popular Power, on a history of peer-to-peer Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users David Anderson of SETI@home, on how SETI@Home created the world's largest computer Jeremie Miller of Jabber, on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet, on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems Roger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata Theodore Hong of Freenet, on performance Richard Lethin of Reputation Technologies, on how reputation can be built online Jon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on security Brandon Wiley of Freenet, on gateways between peer-to-peer systems You'll find information on the latest and greatest systems as well as upcoming efforts in this book. (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition Table of contents: I. Context and Overview 1. A Network of Peers: Peer-to-Peer Models Through the History of the Internet A revisionist history of peer-to-peer (1969-1995) Usenet DNS The network model of the Internet explosion (1995-1999) The switch to client/server The breakdown of cooperation Spam: Uncooperative people The TCP rate equation: Cooperative protocols Firewalls, dynamic IP, NAT: The end of the open network Asymmetric bandwidth Observations on the current crop of peer-to-peer applications (2000) Authoring is not the same as publishing Decentralization Abusing port 80 Peer-to-peer prescriptions (2001-?) Technical solutions: Return to the old Internet Social solutions: Engineer polite behavior Conclusions 2. Listening to Napster Resource-centric addressing for unstable environments Peer-to-peer is as peer-to-peer does The veil is pierced Real solutions to real problems Who’s in and who’s out? Peer-to-peer is a horseless carriage Follow the users Users reward simplicity Listen to Napster It’s the applications, stupid Decentralization is a tool, not a goal Where’s the content? PCs are the dark matter of the Internet Promiscuous computers Nothing succeeds like address, or, DNS isn’t the only game in town An explosion of protocols An economic rather than legal challenge All you can eat Yesterday’s technology at tomorrow’s prices, two days late 30 million Britney fans does not a revolution make Peer-to-peer architecture and second-class status Users as consumers, users as providers New winners and losers 3. Remaking the Peer-to-Peer Meme From business models to meme maps A success story: From free software to open source The current peer-to-peer meme map The new peer-to-peer meme map File sharing: Napster and successors Mixing centralization and decentralization: Usenet, email, and IP routing Maximizing use of far-flung resources: Distributed computation Immediate information sharing: The new instant messaging services The writable Web Web services and content syndication Peer-to-peer and devices Strategic positioning and core competencies 4. The Cornucopia of the Commons Ways to fill shared databases CDDB: A case study in how to get a manually created database Napster: Harnessing the power of personal selfishness The commons II. Projects 5. SETI@home Radio SETI How SETI@home works Trials and tribulations Human factors The world’s most powerful computer The peer-to-peer paradigm 6. Jabber: Conversational Technologies Conversations and peers Evolving toward the ideal Jabber is created The centrality of XML Pieces of the infrastructure Identity Presence Roster Architecture Protocols Browsing Conversation management Conclusion 7. Mixmaster Remailers A simple example of remailers Onion routing How Type 2 remailers differ from Type 1 remailers General discussion 8. Gnutella Gnutella in a gnutshell A brief history Gnutella’s first breath Open source to the rescue What makes Gnutella different? Gnutella works like the real world A Gnutella cocktail party A client/server cocktail party Client/server means control, and control means responsibility The client is the server is the network Distributed intelligence Different from Freenet Gnutella’s communication system Message-based, application-level routing TCP broadcast Message broadcasting Dynamic routing Lossy transmission over reliable TCP Organizing Gnutella Placing nodes on the network Gnutella’s analogues The Gnutella horizon Cellular telephony and the Gnutella network Ethernet Cultivating the Gnutella network Gnutella’s traffic problems Host caches Returning the network to its natural state Private Gnutella networks Reducing broadcasts makes a significant impact The policy debates Napster wars Anonymity and peer-to-peer Gnutella pseudoanonymity Downloads, now in the privacy of your own direct connection Anonymous Gnutella chat Next-generation peer-to-peer file-sharing technologies Gnutella’s effects 9. Freenet Requests Detail of requests The data store Keys Key types Content Hash Keys (CHKs) Keyword Signed Keys (KSKs) Signature Verification Keys (SVKs) Keys and redirects Conclusions 10. Red Rover Architecture The hub The clients The subscribers Client life cycle Putting low-tech “weaknesses” into perspective Acknowledgments 11. Publius Why censorship-resistant anonymous publishing? Publius and other systems in this book System architecture Cryptography fundamentals Encryption and decryption Secret sharing Hash functions Publius operations Publish operation Retrieve operation Update operation Delete operation Publius implementation User interface Server software Client software Publius MIME type Publius in a nutshell 12. Free Haven Privacy in data-sharing systems Reliability with anonymity Anonymity for anonymous storage Partial anonymity The design of Free Haven Elements of the system Storage Publication Retrieval Share expiration Document revocation Trading Receipts Accountability and the buddy system Communications channel Reputation system Introducers Implementation status Attacks on Free Haven Attacks on documents or the servnet Attacks on the reputation system Attacks on anonymity An analysis of anonymity Future work Conclusion Acknowledgments III. Technical Topics 13. Metadata Data about data Metadata lessons from the Web Resource description Searching Resources and relationships: A historical overview Foundations of resource description: Unique identifiers A contrasting evolution: MP3 and the metadata marketplace Conclusion 14. Performance A note on terminology Why performance matters Bandwidth barriers It’s a small, small world An excursion into graph theory The small-world model Case study 1: Freenet Initial experiments Simulating growth Simulating fault tolerance Link distribution in Freenet The impact of free riding Scalability Case study 2: Gnutella Initial experiments Fault tolerance and link distribution in Gnutella The impact of free riding Scalability Conclusions Acknowledgments 15. Trust Trust in real life, and its lessons for computer networks Trusting downloaded software Message digest functions Digital signatures Digital certificates Signature verification Open source software Sandboxing and wrappers Trust in censorship-resistant publishing systems Publius in a nutshell Risks involved in web server logging Anonymizing proxies Censorship in Publius Using the Update mechanism to censor Publius proxy volunteers Third-party trust issues in Publius Other anonymity tools SSL Mix networks Crowds Denial of service attacks Quota systems CPU-based payment schemes Anonymous e-cash payment schemes Legal and physical attacks Trust in other systems Mojo Nation and Free Haven The Eternity Service Eternity Usenet File-sharing systems Napster Gnutella Freenet Content certification Trust and search engines Distributed search engines Deniability Conclusions 16. Accountability The difficulty of accountability Special problems posed by peer-to-peer systems Peer-to-peer models and their impacts on accountability Purposes of micropayments and reputation systems Junk mail as a resource allocation problem Pseudonymity and its consequences Problems with pseudospoofing and possible defenses Reputation for sale—SOLD! Common methods for dealing with flooding and DoS attacks Caching and mirroring Active caching and mirroring Micropayment schemes Varieties of micropayments or digital cash Nonfungible micropayments Extended types of nonfungible micropayments Nonparallelizable work functions Fungible micropayments Freeloading Fungible payments for accountability Micropayment digital cash schemes Making money off others’ work Anonymous macropayment digital cash schemes The use and effectiveness of micropayments in peer-to-peer systems Identity-based payment policies General considerations in an economic analysis of micropayment design Moderating security levels: An accountability slider Reputations Early reputation systems online Codifying reputation on a wide scale: The PGP web of trust Who will moderate the moderators: Slashdot Reputations worth real money: eBay A reputation system that resists pseudospoofing: Advogato System successes and failures Scoring systems Attacks and adversaries Aspects of a scoring system Collecting ratings Bootstrapping Personalizing reputation searches Scoring algorithms Privacy and information leaks Decentralizing the scoring system Multiple trusted parties True decentralization A case study: Accountability in Free Haven Micropayments The difficulty of distributed systems: How to exchange micropayments among peers Micropayments in the Free Haven context Reputation systems Other considerations from the case study Conclusion Acknowledgments 17. Reputation Examples of using the Reputation Server Reputation domains, entities, and multidimensional reputations Identity as an element of reputation Interface to the marketplace Scoring system Reputation metrics Credibility Interdomain sharing Bootstrapping Long-term vision Central Reputation Server versus distributed Reputation Servers Summary 18. Security Groove versus email Why secure email is a failure The solution: A Groove shared space Security characteristics of a shared space Mutually-trusting shared spaces Anatomy of a mutually-trusting shared space The key to mutual trust Mutually-suspicious shared spaces Message fanout Fetching lost messages Shared space formation and trusted authentication Inviting people into shared spaces The New-Member-Added delta message Key versioning and key dependencies Central control and local autonomy Practical security for real-world collaboration Taxonomy of Groove keys 19. Interoperability Through Gateways Why unification? Why not an ÜberNetwork? Why not an ÜberClient? Why not just use XML? One network with a thousand faces Well-known networks and their roles Freenet Gnutella Mojo Nation Free Haven and Publius Problems creating gateways Problems with inserts Problems with requests Freenet Gnutella Mojo Nation Publius Free Haven Gateway implementation Existing projects Conclusion Acknowledgments 20. Afterword Precedents and parries Who gets to innovate? A clean sweep? A. Directory of Peer-to-Peer Projects B. Contributors Index People also search for (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition: the power and potential of peer support in workplace interventions harness the power of power of peer peer-to-peer harnessing the power of disruptive technologies pdf harness the power of data Tags: Andy Oram, Harnessing, Power, Disruptive Technologies *Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment."> Popular Power, on a history of peer-to-peer Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users David Anderson of SETI@home, on how SETI@Home created the world's largest computer Jeremie Miller of Jabber, on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet, on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems Roger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata Theodore Hong of Freenet, on performance Richard Lethin of Reputation Technologies, on how reputation can be built online Jon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on security Brandon Wiley of Freenet, on gateways between peer-to-peer systems You'll find information on the latest and greatest systems as well as upcoming efforts in this book. (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition Table of contents: I. Context and Overview 1. A Network of Peers: Peer-to-Peer Models Through the History of the Internet A revisionist history of peer-to-peer (1969-1995) Usenet DNS The network model of the Internet explosion (1995-1999) The switch to client/server The breakdown of cooperation Spam: Uncooperative people The TCP rate equation: Cooperative protocols Firewalls, dynamic IP, NAT: The end of the open network Asymmetric bandwidth Observations on the current crop of peer-to-peer applications (2000) Authoring is not the same as publishing Decentralization Abusing port 80 Peer-to-peer prescriptions (2001-?) Technical solutions: Return to the old Internet Social solutions: Engineer polite behavior Conclusions 2. Listening to Napster Resource-centric addressing for unstable environments Peer-to-peer is as peer-to-peer does The veil is pierced Real solutions to real problems Who’s in and who’s out? Peer-to-peer is a horseless carriage Follow the users Users reward simplicity Listen to Napster It’s the applications, stupid Decentralization is a tool, not a goal Where’s the content? PCs are the dark matter of the Internet Promiscuous computers Nothing succeeds like address, or, DNS isn’t the only game in town An explosion of protocols An economic rather than legal challenge All you can eat Yesterday’s technology at tomorrow’s prices, two days late 30 million Britney fans does not a revolution make Peer-to-peer architecture and second-class status Users as consumers, users as providers New winners and losers 3. Remaking the Peer-to-Peer Meme From business models to meme maps A success story: From free software to open source The current peer-to-peer meme map The new peer-to-peer meme map File sharing: Napster and successors Mixing centralization and decentralization: Usenet, email, and IP routing Maximizing use of far-flung resources: Distributed computation Immediate information sharing: The new instant messaging services The writable Web Web services and content syndication Peer-to-peer and devices Strategic positioning and core competencies 4. The Cornucopia of the Commons Ways to fill shared databases CDDB: A case study in how to get a manually created database Napster: Harnessing the power of personal selfishness The commons II. Projects 5. SETI@home Radio SETI How SETI@home works Trials and tribulations Human factors The world’s most powerful computer The peer-to-peer paradigm 6. Jabber: Conversational Technologies Conversations and peers Evolving toward the ideal Jabber is created The centrality of XML Pieces of the infrastructure Identity Presence Roster Architecture Protocols Browsing Conversation management Conclusion 7. Mixmaster Remailers A simple example of remailers Onion routing How Type 2 remailers differ from Type 1 remailers General discussion 8. Gnutella Gnutella in a gnutshell A brief history Gnutella’s first breath Open source to the rescue What makes Gnutella different? Gnutella works like the real world A Gnutella cocktail party A client/server cocktail party Client/server means control, and control means responsibility The client is the server is the network Distributed intelligence Different from Freenet Gnutella’s communication system Message-based, application-level routing TCP broadcast Message broadcasting Dynamic routing Lossy transmission over reliable TCP Organizing Gnutella Placing nodes on the network Gnutella’s analogues The Gnutella horizon Cellular telephony and the Gnutella network Ethernet Cultivating the Gnutella network Gnutella’s traffic problems Host caches Returning the network to its natural state Private Gnutella networks Reducing broadcasts makes a significant impact The policy debates Napster wars Anonymity and peer-to-peer Gnutella pseudoanonymity Downloads, now in the privacy of your own direct connection Anonymous Gnutella chat Next-generation peer-to-peer file-sharing technologies Gnutella’s effects 9. Freenet Requests Detail of requests The data store Keys Key types Content Hash Keys (CHKs) Keyword Signed Keys (KSKs) Signature Verification Keys (SVKs) Keys and redirects Conclusions 10. Red Rover Architecture The hub The clients The subscribers Client life cycle Putting low-tech “weaknesses” into perspective Acknowledgments 11. Publius Why censorship-resistant anonymous publishing? Publius and other systems in this book System architecture Cryptography fundamentals Encryption and decryption Secret sharing Hash functions Publius operations Publish operation Retrieve operation Update operation Delete operation Publius implementation User interface Server software Client software Publius MIME type Publius in a nutshell 12. Free Haven Privacy in data-sharing systems Reliability with anonymity Anonymity for anonymous storage Partial anonymity The design of Free Haven Elements of the system Storage Publication Retrieval Share expiration Document revocation Trading Receipts Accountability and the buddy system Communications channel Reputation system Introducers Implementation status Attacks on Free Haven Attacks on documents or the servnet Attacks on the reputation system Attacks on anonymity An analysis of anonymity Future work Conclusion Acknowledgments III. Technical Topics 13. Metadata Data about data Metadata lessons from the Web Resource description Searching Resources and relationships: A historical overview Foundations of resource description: Unique identifiers A contrasting evolution: MP3 and the metadata marketplace Conclusion 14. Performance A note on terminology Why performance matters Bandwidth barriers It’s a small, small world An excursion into graph theory The small-world model Case study 1: Freenet Initial experiments Simulating growth Simulating fault tolerance Link distribution in Freenet The impact of free riding Scalability Case study 2: Gnutella Initial experiments Fault tolerance and link distribution in Gnutella The impact of free riding Scalability Conclusions Acknowledgments 15. Trust Trust in real life, and its lessons for computer networks Trusting downloaded software Message digest functions Digital signatures Digital certificates Signature verification Open source software Sandboxing and wrappers Trust in censorship-resistant publishing systems Publius in a nutshell Risks involved in web server logging Anonymizing proxies Censorship in Publius Using the Update mechanism to censor Publius proxy volunteers Third-party trust issues in Publius Other anonymity tools SSL Mix networks Crowds Denial of service attacks Quota systems CPU-based payment schemes Anonymous e-cash payment schemes Legal and physical attacks Trust in other systems Mojo Nation and Free Haven The Eternity Service Eternity Usenet File-sharing systems Napster Gnutella Freenet Content certification Trust and search engines Distributed search engines Deniability Conclusions 16. Accountability The difficulty of accountability Special problems posed by peer-to-peer systems Peer-to-peer models and their impacts on accountability Purposes of micropayments and reputation systems Junk mail as a resource allocation problem Pseudonymity and its consequences Problems with pseudospoofing and possible defenses Reputation for sale—SOLD! Common methods for dealing with flooding and DoS attacks Caching and mirroring Active caching and mirroring Micropayment schemes Varieties of micropayments or digital cash Nonfungible micropayments Extended types of nonfungible micropayments Nonparallelizable work functions Fungible micropayments Freeloading Fungible payments for accountability Micropayment digital cash schemes Making money off others’ work Anonymous macropayment digital cash schemes The use and effectiveness of micropayments in peer-to-peer systems Identity-based payment policies General considerations in an economic analysis of micropayment design Moderating security levels: An accountability slider Reputations Early reputation systems online Codifying reputation on a wide scale: The PGP web of trust Who will moderate the moderators: Slashdot Reputations worth real money: eBay A reputation system that resists pseudospoofing: Advogato System successes and failures Scoring systems Attacks and adversaries Aspects of a scoring system Collecting ratings Bootstrapping Personalizing reputation searches Scoring algorithms Privacy and information leaks Decentralizing the scoring system Multiple trusted parties True decentralization A case study: Accountability in Free Haven Micropayments The difficulty of distributed systems: How to exchange micropayments among peers Micropayments in the Free Haven context Reputation systems Other considerations from the case study Conclusion Acknowledgments 17. Reputation Examples of using the Reputation Server Reputation domains, entities, and multidimensional reputations Identity as an element of reputation Interface to the marketplace Scoring system Reputation metrics Credibility Interdomain sharing Bootstrapping Long-term vision Central Reputation Server versus distributed Reputation Servers Summary 18. Security Groove versus email Why secure email is a failure The solution: A Groove shared space Security characteristics of a shared space Mutually-trusting shared spaces Anatomy of a mutually-trusting shared space The key to mutual trust Mutually-suspicious shared spaces Message fanout Fetching lost messages Shared space formation and trusted authentication Inviting people into shared spaces The New-Member-Added delta message Key versioning and key dependencies Central control and local autonomy Practical security for real-world collaboration Taxonomy of Groove keys 19. Interoperability Through Gateways Why unification? Why not an ÜberNetwork? Why not an ÜberClient? Why not just use XML? One network with a thousand faces Well-known networks and their roles Freenet Gnutella Mojo Nation Free Haven and Publius Problems creating gateways Problems with inserts Problems with requests Freenet Gnutella Mojo Nation Publius Free Haven Gateway implementation Existing projects Conclusion Acknowledgments 20. Afterword Precedents and parries Who gets to innovate? A clean sweep? A. Directory of Peer-to-Peer Projects B. Contributors Index People also search for (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition: the power and potential of peer support in workplace interventions harness the power of power of peer peer-to-peer harnessing the power of disruptive technologies pdf harness the power of data Tags: Andy Oram, Harnessing, Power, Disruptive Technologies *Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment."> Popular Power, on a history of peer-to-peer Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users David Anderson of SETI@home, on how SETI@Home created the world's largest computer Jeremie Miller of Jabber, on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet, on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems Roger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata Theodore Hong of Freenet, on performance Richard Lethin of Reputation Technologies, on how reputation can be built online Jon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on security Brandon Wiley of Freenet, on gateways between peer-to-peer systems You'll find information on the latest and greatest systems as well as upcoming efforts in this book. (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition Table of contents: I. Context and Overview 1. A Network of Peers: Peer-to-Peer Models Through the History of the Internet A revisionist history of peer-to-peer (1969-1995) Usenet DNS The network model of the Internet explosion (1995-1999) The switch to client/server The breakdown of cooperation Spam: Uncooperative people The TCP rate equation: Cooperative protocols Firewalls, dynamic IP, NAT: The end of the open network Asymmetric bandwidth Observations on the current crop of peer-to-peer applications (2000) Authoring is not the same as publishing Decentralization Abusing port 80 Peer-to-peer prescriptions (2001-?) Technical solutions: Return to the old Internet Social solutions: Engineer polite behavior Conclusions 2. Listening to Napster Resource-centric addressing for unstable environments Peer-to-peer is as peer-to-peer does The veil is pierced Real solutions to real problems Who’s in and who’s out? Peer-to-peer is a horseless carriage Follow the users Users reward simplicity Listen to Napster It’s the applications, stupid Decentralization is a tool, not a goal Where’s the content? PCs are the dark matter of the Internet Promiscuous computers Nothing succeeds like address, or, DNS isn’t the only game in town An explosion of protocols An economic rather than legal challenge All you can eat Yesterday’s technology at tomorrow’s prices, two days late 30 million Britney fans does not a revolution make Peer-to-peer architecture and second-class status Users as consumers, users as providers New winners and losers 3. Remaking the Peer-to-Peer Meme From business models to meme maps A success story: From free software to open source The current peer-to-peer meme map The new peer-to-peer meme map File sharing: Napster and successors Mixing centralization and decentralization: Usenet, email, and IP routing Maximizing use of far-flung resources: Distributed computation Immediate information sharing: The new instant messaging services The writable Web Web services and content syndication Peer-to-peer and devices Strategic positioning and core competencies 4. The Cornucopia of the Commons Ways to fill shared databases CDDB: A case study in how to get a manually created database Napster: Harnessing the power of personal selfishness The commons II. Projects 5. SETI@home Radio SETI How SETI@home works Trials and tribulations Human factors The world’s most powerful computer The peer-to-peer paradigm 6. Jabber: Conversational Technologies Conversations and peers Evolving toward the ideal Jabber is created The centrality of XML Pieces of the infrastructure Identity Presence Roster Architecture Protocols Browsing Conversation management Conclusion 7. Mixmaster Remailers A simple example of remailers Onion routing How Type 2 remailers differ from Type 1 remailers General discussion 8. Gnutella Gnutella in a gnutshell A brief history Gnutella’s first breath Open source to the rescue What makes Gnutella different? Gnutella works like the real world A Gnutella cocktail party A client/server cocktail party Client/server means control, and control means responsibility The client is the server is the network Distributed intelligence Different from Freenet Gnutella’s communication system Message-based, application-level routing TCP broadcast Message broadcasting Dynamic routing Lossy transmission over reliable TCP Organizing Gnutella Placing nodes on the network Gnutella’s analogues The Gnutella horizon Cellular telephony and the Gnutella network Ethernet Cultivating the Gnutella network Gnutella’s traffic problems Host caches Returning the network to its natural state Private Gnutella networks Reducing broadcasts makes a significant impact The policy debates Napster wars Anonymity and peer-to-peer Gnutella pseudoanonymity Downloads, now in the privacy of your own direct connection Anonymous Gnutella chat Next-generation peer-to-peer file-sharing technologies Gnutella’s effects 9. Freenet Requests Detail of requests The data store Keys Key types Content Hash Keys (CHKs) Keyword Signed Keys (KSKs) Signature Verification Keys (SVKs) Keys and redirects Conclusions 10. Red Rover Architecture The hub The clients The subscribers Client life cycle Putting low-tech “weaknesses” into perspective Acknowledgments 11. Publius Why censorship-resistant anonymous publishing? Publius and other systems in this book System architecture Cryptography fundamentals Encryption and decryption Secret sharing Hash functions Publius operations Publish operation Retrieve operation Update operation Delete operation Publius implementation User interface Server software Client software Publius MIME type Publius in a nutshell 12. Free Haven Privacy in data-sharing systems Reliability with anonymity Anonymity for anonymous storage Partial anonymity The design of Free Haven Elements of the system Storage Publication Retrieval Share expiration Document revocation Trading Receipts Accountability and the buddy system Communications channel Reputation system Introducers Implementation status Attacks on Free Haven Attacks on documents or the servnet Attacks on the reputation system Attacks on anonymity An analysis of anonymity Future work Conclusion Acknowledgments III. Technical Topics 13. Metadata Data about data Metadata lessons from the Web Resource description Searching Resources and relationships: A historical overview Foundations of resource description: Unique identifiers A contrasting evolution: MP3 and the metadata marketplace Conclusion 14. Performance A note on terminology Why performance matters Bandwidth barriers It’s a small, small world An excursion into graph theory The small-world model Case study 1: Freenet Initial experiments Simulating growth Simulating fault tolerance Link distribution in Freenet The impact of free riding Scalability Case study 2: Gnutella Initial experiments Fault tolerance and link distribution in Gnutella The impact of free riding Scalability Conclusions Acknowledgments 15. Trust Trust in real life, and its lessons for computer networks Trusting downloaded software Message digest functions Digital signatures Digital certificates Signature verification Open source software Sandboxing and wrappers Trust in censorship-resistant publishing systems Publius in a nutshell Risks involved in web server logging Anonymizing proxies Censorship in Publius Using the Update mechanism to censor Publius proxy volunteers Third-party trust issues in Publius Other anonymity tools SSL Mix networks Crowds Denial of service attacks Quota systems CPU-based payment schemes Anonymous e-cash payment schemes Legal and physical attacks Trust in other systems Mojo Nation and Free Haven The Eternity Service Eternity Usenet File-sharing systems Napster Gnutella Freenet Content certification Trust and search engines Distributed search engines Deniability Conclusions 16. Accountability The difficulty of accountability Special problems posed by peer-to-peer systems Peer-to-peer models and their impacts on accountability Purposes of micropayments and reputation systems Junk mail as a resource allocation problem Pseudonymity and its consequences Problems with pseudospoofing and possible defenses Reputation for sale—SOLD! Common methods for dealing with flooding and DoS attacks Caching and mirroring Active caching and mirroring Micropayment schemes Varieties of micropayments or digital cash Nonfungible micropayments Extended types of nonfungible micropayments Nonparallelizable work functions Fungible micropayments Freeloading Fungible payments for accountability Micropayment digital cash schemes Making money off others’ work Anonymous macropayment digital cash schemes The use and effectiveness of micropayments in peer-to-peer systems Identity-based payment policies General considerations in an economic analysis of micropayment design Moderating security levels: An accountability slider Reputations Early reputation systems online Codifying reputation on a wide scale: The PGP web of trust Who will moderate the moderators: Slashdot Reputations worth real money: eBay A reputation system that resists pseudospoofing: Advogato System successes and failures Scoring systems Attacks and adversaries Aspects of a scoring system Collecting ratings Bootstrapping Personalizing reputation searches Scoring algorithms Privacy and information leaks Decentralizing the scoring system Multiple trusted parties True decentralization A case study: Accountability in Free Haven Micropayments The difficulty of distributed systems: How to exchange micropayments among peers Micropayments in the Free Haven context Reputation systems Other considerations from the case study Conclusion Acknowledgments 17. Reputation Examples of using the Reputation Server Reputation domains, entities, and multidimensional reputations Identity as an element of reputation Interface to the marketplace Scoring system Reputation metrics Credibility Interdomain sharing Bootstrapping Long-term vision Central Reputation Server versus distributed Reputation Servers Summary 18. Security Groove versus email Why secure email is a failure The solution: A Groove shared space Security characteristics of a shared space Mutually-trusting shared spaces Anatomy of a mutually-trusting shared space The key to mutual trust Mutually-suspicious shared spaces Message fanout Fetching lost messages Shared space formation and trusted authentication Inviting people into shared spaces The New-Member-Added delta message Key versioning and key dependencies Central control and local autonomy Practical security for real-world collaboration Taxonomy of Groove keys 19. Interoperability Through Gateways Why unification? Why not an ÜberNetwork? Why not an ÜberClient? Why not just use XML? One network with a thousand faces Well-known networks and their roles Freenet Gnutella Mojo Nation Free Haven and Publius Problems creating gateways Problems with inserts Problems with requests Freenet Gnutella Mojo Nation Publius Free Haven Gateway implementation Existing projects Conclusion Acknowledgments 20. Afterword Precedents and parries Who gets to innovate? A clean sweep? A. Directory of Peer-to-Peer Projects B. Contributors Index People also search for (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition: the power and potential of peer support in workplace interventions harness the power of power of peer peer-to-peer harnessing the power of disruptive technologies pdf harness the power of data Tags: Andy Oram, Harnessing, Power, Disruptive Technologies *Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment."> Popular Power, on a history of peer-to-peer Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users David Anderson of SETI@home, on how SETI@Home created the world's largest computer Jeremie Miller of Jabber, on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet, on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems Roger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata Theodore Hong of Freenet, on performance Richard Lethin of Reputation Technologies, on how reputation can be built online Jon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on security Brandon Wiley of Freenet, on gateways between peer-to-peer systems You'll find information on the latest and greatest systems as well as upcoming efforts in this book. (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition Table of contents: I. Context and Overview 1. A Network of Peers: Peer-to-Peer Models Through the History of the Internet A revisionist history of peer-to-peer (1969-1995) Usenet DNS The network model of the Internet explosion (1995-1999) The switch to client/server The breakdown of cooperation Spam: Uncooperative people The TCP rate equation: Cooperative protocols Firewalls, dynamic IP, NAT: The end of the open network Asymmetric bandwidth Observations on the current crop of peer-to-peer applications (2000) Authoring is not the same as publishing Decentralization Abusing port 80 Peer-to-peer prescriptions (2001-?) Technical solutions: Return to the old Internet Social solutions: Engineer polite behavior Conclusions 2. Listening to Napster Resource-centric addressing for unstable environments Peer-to-peer is as peer-to-peer does The veil is pierced Real solutions to real problems Who’s in and who’s out? Peer-to-peer is a horseless carriage Follow the users Users reward simplicity Listen to Napster It’s the applications, stupid Decentralization is a tool, not a goal Where’s the content? PCs are the dark matter of the Internet Promiscuous computers Nothing succeeds like address, or, DNS isn’t the only game in town An explosion of protocols An economic rather than legal challenge All you can eat Yesterday’s technology at tomorrow’s prices, two days late 30 million Britney fans does not a revolution make Peer-to-peer architecture and second-class status Users as consumers, users as providers New winners and losers 3. Remaking the Peer-to-Peer Meme From business models to meme maps A success story: From free software to open source The current peer-to-peer meme map The new peer-to-peer meme map File sharing: Napster and successors Mixing centralization and decentralization: Usenet, email, and IP routing Maximizing use of far-flung resources: Distributed computation Immediate information sharing: The new instant messaging services The writable Web Web services and content syndication Peer-to-peer and devices Strategic positioning and core competencies 4. The Cornucopia of the Commons Ways to fill shared databases CDDB: A case study in how to get a manually created database Napster: Harnessing the power of personal selfishness The commons II. Projects 5. SETI@home Radio SETI How SETI@home works Trials and tribulations Human factors The world’s most powerful computer The peer-to-peer paradigm 6. Jabber: Conversational Technologies Conversations and peers Evolving toward the ideal Jabber is created The centrality of XML Pieces of the infrastructure Identity Presence Roster Architecture Protocols Browsing Conversation management Conclusion 7. Mixmaster Remailers A simple example of remailers Onion routing How Type 2 remailers differ from Type 1 remailers General discussion 8. Gnutella Gnutella in a gnutshell A brief history Gnutella’s first breath Open source to the rescue What makes Gnutella different? Gnutella works like the real world A Gnutella cocktail party A client/server cocktail party Client/server means control, and control means responsibility The client is the server is the network Distributed intelligence Different from Freenet Gnutella’s communication system Message-based, application-level routing TCP broadcast Message broadcasting Dynamic routing Lossy transmission over reliable TCP Organizing Gnutella Placing nodes on the network Gnutella’s analogues The Gnutella horizon Cellular telephony and the Gnutella network Ethernet Cultivating the Gnutella network Gnutella’s traffic problems Host caches Returning the network to its natural state Private Gnutella networks Reducing broadcasts makes a significant impact The policy debates Napster wars Anonymity and peer-to-peer Gnutella pseudoanonymity Downloads, now in the privacy of your own direct connection Anonymous Gnutella chat Next-generation peer-to-peer file-sharing technologies Gnutella’s effects 9. Freenet Requests Detail of requests The data store Keys Key types Content Hash Keys (CHKs) Keyword Signed Keys (KSKs) Signature Verification Keys (SVKs) Keys and redirects Conclusions 10. Red Rover Architecture The hub The clients The subscribers Client life cycle Putting low-tech “weaknesses” into perspective Acknowledgments 11. Publius Why censorship-resistant anonymous publishing? Publius and other systems in this book System architecture Cryptography fundamentals Encryption and decryption Secret sharing Hash functions Publius operations Publish operation Retrieve operation Update operation Delete operation Publius implementation User interface Server software Client software Publius MIME type Publius in a nutshell 12. Free Haven Privacy in data-sharing systems Reliability with anonymity Anonymity for anonymous storage Partial anonymity The design of Free Haven Elements of the system Storage Publication Retrieval Share expiration Document revocation Trading Receipts Accountability and the buddy system Communications channel Reputation system Introducers Implementation status Attacks on Free Haven Attacks on documents or the servnet Attacks on the reputation system Attacks on anonymity An analysis of anonymity Future work Conclusion Acknowledgments III. Technical Topics 13. Metadata Data about data Metadata lessons from the Web Resource description Searching Resources and relationships: A historical overview Foundations of resource description: Unique identifiers A contrasting evolution: MP3 and the metadata marketplace Conclusion 14. Performance A note on terminology Why performance matters Bandwidth barriers It’s a small, small world An excursion into graph theory The small-world model Case study 1: Freenet Initial experiments Simulating growth Simulating fault tolerance Link distribution in Freenet The impact of free riding Scalability Case study 2: Gnutella Initial experiments Fault tolerance and link distribution in Gnutella The impact of free riding Scalability Conclusions Acknowledgments 15. Trust Trust in real life, and its lessons for computer networks Trusting downloaded software Message digest functions Digital signatures Digital certificates Signature verification Open source software Sandboxing and wrappers Trust in censorship-resistant publishing systems Publius in a nutshell Risks involved in web server logging Anonymizing proxies Censorship in Publius Using the Update mechanism to censor Publius proxy volunteers Third-party trust issues in Publius Other anonymity tools SSL Mix networks Crowds Denial of service attacks Quota systems CPU-based payment schemes Anonymous e-cash payment schemes Legal and physical attacks Trust in other systems Mojo Nation and Free Haven The Eternity Service Eternity Usenet File-sharing systems Napster Gnutella Freenet Content certification Trust and search engines Distributed search engines Deniability Conclusions 16. Accountability The difficulty of accountability Special problems posed by peer-to-peer systems Peer-to-peer models and their impacts on accountability Purposes of micropayments and reputation systems Junk mail as a resource allocation problem Pseudonymity and its consequences Problems with pseudospoofing and possible defenses Reputation for sale—SOLD! Common methods for dealing with flooding and DoS attacks Caching and mirroring Active caching and mirroring Micropayment schemes Varieties of micropayments or digital cash Nonfungible micropayments Extended types of nonfungible micropayments Nonparallelizable work functions Fungible micropayments Freeloading Fungible payments for accountability Micropayment digital cash schemes Making money off others’ work Anonymous macropayment digital cash schemes The use and effectiveness of micropayments in peer-to-peer systems Identity-based payment policies General considerations in an economic analysis of micropayment design Moderating security levels: An accountability slider Reputations Early reputation systems online Codifying reputation on a wide scale: The PGP web of trust Who will moderate the moderators: Slashdot Reputations worth real money: eBay A reputation system that resists pseudospoofing: Advogato System successes and failures Scoring systems Attacks and adversaries Aspects of a scoring system Collecting ratings Bootstrapping Personalizing reputation searches Scoring algorithms Privacy and information leaks Decentralizing the scoring system Multiple trusted parties True decentralization A case study: Accountability in Free Haven Micropayments The difficulty of distributed systems: How to exchange micropayments among peers Micropayments in the Free Haven context Reputation systems Other considerations from the case study Conclusion Acknowledgments 17. Reputation Examples of using the Reputation Server Reputation domains, entities, and multidimensional reputations Identity as an element of reputation Interface to the marketplace Scoring system Reputation metrics Credibility Interdomain sharing Bootstrapping Long-term vision Central Reputation Server versus distributed Reputation Servers Summary 18. Security Groove versus email Why secure email is a failure The solution: A Groove shared space Security characteristics of a shared space Mutually-trusting shared spaces Anatomy of a mutually-trusting shared space The key to mutual trust Mutually-suspicious shared spaces Message fanout Fetching lost messages Shared space formation and trusted authentication Inviting people into shared spaces The New-Member-Added delta message Key versioning and key dependencies Central control and local autonomy Practical security for real-world collaboration Taxonomy of Groove keys 19. Interoperability Through Gateways Why unification? Why not an ÜberNetwork? Why not an ÜberClient? Why not just use XML? One network with a thousand faces Well-known networks and their roles Freenet Gnutella Mojo Nation Free Haven and Publius Problems creating gateways Problems with inserts Problems with requests Freenet Gnutella Mojo Nation Publius Free Haven Gateway implementation Existing projects Conclusion Acknowledgments 20. Afterword Precedents and parries Who gets to innovate? A clean sweep? A. Directory of Peer-to-Peer Projects B. Contributors Index People also search for (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition: the power and potential of peer support in workplace interventions harness the power of power of peer peer-to-peer harnessing the power of disruptive technologies pdf harness the power of data Tags: Andy Oram, Harnessing, Power, Disruptive Technologies *Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.">
Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link. https://ebooknice.com/page/post?id=faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookNice Team
Status:
Available4.6
41 reviews(Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition by Andy Oram - Ebook PDF Instant Download/Delivery: 9780596001100 ,059600110X
Full download (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition after payment
Product details:
ISBN 10: 059600110X
ISBN 13: 9780596001100
Author: Andy Oram
(Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition Table of contents:
I. Context and Overview
1. A Network of Peers: Peer-to-Peer Models Through the History of the Internet
A revisionist history of peer-to-peer (1969-1995)
Usenet
DNS
The network model of the Internet explosion (1995-1999)
The switch to client/server
The breakdown of cooperation
Spam: Uncooperative people
The TCP rate equation: Cooperative protocols
Firewalls, dynamic IP, NAT: The end of the open network
Asymmetric bandwidth
Observations on the current crop of peer-to-peer applications (2000)
Authoring is not the same as publishing
Decentralization
Abusing port 80
Peer-to-peer prescriptions (2001-?)
Technical solutions: Return to the old Internet
Social solutions: Engineer polite behavior
Conclusions
2. Listening to Napster
Resource-centric addressing for unstable environments
Peer-to-peer is as peer-to-peer does
The veil is pierced
Real solutions to real problems
Who’s in and who’s out?
Peer-to-peer is a horseless carriage
Follow the users
Users reward simplicity
Listen to Napster
It’s the applications, stupid
Decentralization is a tool, not a goal
Where’s the content?
PCs are the dark matter of the Internet
Promiscuous computers
Nothing succeeds like address, or, DNS isn’t the only game in town
An explosion of protocols
An economic rather than legal challenge
All you can eat
Yesterday’s technology at tomorrow’s prices, two days late
30 million Britney fans does not a revolution make
Peer-to-peer architecture and second-class status
Users as consumers, users as providers
New winners and losers
3. Remaking the Peer-to-Peer Meme
From business models to meme maps
A success story: From free software to open source
The current peer-to-peer meme map
The new peer-to-peer meme map
File sharing: Napster and successors
Mixing centralization and decentralization: Usenet, email, and IP routing
Maximizing use of far-flung resources: Distributed computation
Immediate information sharing: The new instant messaging services
The writable Web
Web services and content syndication
Peer-to-peer and devices
Strategic positioning and core competencies
4. The Cornucopia of the Commons
Ways to fill shared databases
CDDB: A case study in how to get a manually created database
Napster: Harnessing the power of personal selfishness
The commons
II. Projects
5. SETI@home
Radio SETI
How SETI@home works
Trials and tribulations
Human factors
The world’s most powerful computer
The peer-to-peer paradigm
6. Jabber: Conversational Technologies
Conversations and peers
Evolving toward the ideal
Jabber is created
The centrality of XML
Pieces of the infrastructure
Identity
Presence
Roster
Architecture
Protocols
Browsing
Conversation management
Conclusion
7. Mixmaster Remailers
A simple example of remailers
Onion routing
How Type 2 remailers differ from Type 1 remailers
General discussion
8. Gnutella
Gnutella in a gnutshell
A brief history
Gnutella’s first breath
Open source to the rescue
What makes Gnutella different?
Gnutella works like the real world
A Gnutella cocktail party
A client/server cocktail party
Client/server means control, and control means responsibility
The client is the server is the network
Distributed intelligence
Different from Freenet
Gnutella’s communication system
Message-based, application-level routing
TCP broadcast
Message broadcasting
Dynamic routing
Lossy transmission over reliable TCP
Organizing Gnutella
Placing nodes on the network
Gnutella’s analogues
The Gnutella horizon
Cellular telephony and the Gnutella network
Ethernet
Cultivating the Gnutella network
Gnutella’s traffic problems
Host caches
Returning the network to its natural state
Private Gnutella networks
Reducing broadcasts makes a significant impact
The policy debates
Napster wars
Anonymity and peer-to-peer
Gnutella pseudoanonymity
Downloads, now in the privacy of your own direct connection
Anonymous Gnutella chat
Next-generation peer-to-peer file-sharing technologies
Gnutella’s effects
9. Freenet
Requests
Detail of requests
The data store
Keys
Key types
Content Hash Keys (CHKs)
Keyword Signed Keys (KSKs)
Signature Verification Keys (SVKs)
Keys and redirects
Conclusions
10. Red Rover
Architecture
The hub
The clients
The subscribers
Client life cycle
Putting low-tech “weaknesses” into perspective
Acknowledgments
11. Publius
Why censorship-resistant anonymous publishing?
Publius and other systems in this book
System architecture
Cryptography fundamentals
Encryption and decryption
Secret sharing
Hash functions
Publius operations
Publish operation
Retrieve operation
Update operation
Delete operation
Publius implementation
User interface
Server software
Client software
Publius MIME type
Publius in a nutshell
12. Free Haven
Privacy in data-sharing systems
Reliability with anonymity
Anonymity for anonymous storage
Partial anonymity
The design of Free Haven
Elements of the system
Storage
Publication
Retrieval
Share expiration
Document revocation
Trading
Receipts
Accountability and the buddy system
Communications channel
Reputation system
Introducers
Implementation status
Attacks on Free Haven
Attacks on documents or the servnet
Attacks on the reputation system
Attacks on anonymity
An analysis of anonymity
Future work
Conclusion
Acknowledgments
III. Technical Topics
13. Metadata
Data about data
Metadata lessons from the Web
Resource description
Searching
Resources and relationships: A historical overview
Foundations of resource description: Unique identifiers
A contrasting evolution: MP3 and the metadata marketplace
Conclusion
14. Performance
A note on terminology
Why performance matters
Bandwidth barriers
It’s a small, small world
An excursion into graph theory
The small-world model
Case study 1: Freenet
Initial experiments
Simulating growth
Simulating fault tolerance
Link distribution in Freenet
The impact of free riding
Scalability
Case study 2: Gnutella
Initial experiments
Fault tolerance and link distribution in Gnutella
The impact of free riding
Scalability
Conclusions
Acknowledgments
15. Trust
Trust in real life, and its lessons for computer networks
Trusting downloaded software
Message digest functions
Digital signatures
Digital certificates
Signature verification
Open source software
Sandboxing and wrappers
Trust in censorship-resistant publishing systems
Publius in a nutshell
Risks involved in web server logging
Anonymizing proxies
Censorship in Publius
Using the Update mechanism to censor
Publius proxy volunteers
Third-party trust issues in Publius
Other anonymity tools
SSL
Mix networks
Crowds
Denial of service attacks
Quota systems
CPU-based payment schemes
Anonymous e-cash payment schemes
Legal and physical attacks
Trust in other systems
Mojo Nation and Free Haven
The Eternity Service
Eternity Usenet
File-sharing systems
Napster
Gnutella
Freenet
Content certification
Trust and search engines
Distributed search engines
Deniability
Conclusions
16. Accountability
The difficulty of accountability
Special problems posed by peer-to-peer systems
Peer-to-peer models and their impacts on accountability
Purposes of micropayments and reputation systems
Junk mail as a resource allocation problem
Pseudonymity and its consequences
Problems with pseudospoofing and possible defenses
Reputation for sale—SOLD!
Common methods for dealing with flooding and DoS attacks
Caching and mirroring
Active caching and mirroring
Micropayment schemes
Varieties of micropayments or digital cash
Nonfungible micropayments
Extended types of nonfungible micropayments
Nonparallelizable work functions
Fungible micropayments
Freeloading
Fungible payments for accountability
Micropayment digital cash schemes
Making money off others’ work
Anonymous macropayment digital cash schemes
The use and effectiveness of micropayments in peer-to-peer systems
Identity-based payment policies
General considerations in an economic analysis of micropayment design
Moderating security levels: An accountability slider
Reputations
Early reputation systems online
Codifying reputation on a wide scale: The PGP web of trust
Who will moderate the moderators: Slashdot
Reputations worth real money: eBay
A reputation system that resists pseudospoofing: Advogato
System successes and failures
Scoring systems
Attacks and adversaries
Aspects of a scoring system
Collecting ratings
Bootstrapping
Personalizing reputation searches
Scoring algorithms
Privacy and information leaks
Decentralizing the scoring system
Multiple trusted parties
True decentralization
A case study: Accountability in Free Haven
Micropayments
The difficulty of distributed systems: How to exchange micropayments among peers
Micropayments in the Free Haven context
Reputation systems
Other considerations from the case study
Conclusion
Acknowledgments
17. Reputation
Examples of using the Reputation Server
Reputation domains, entities, and multidimensional reputations
Identity as an element of reputation
Interface to the marketplace
Scoring system
Reputation metrics
Credibility
Interdomain sharing
Bootstrapping
Long-term vision
Central Reputation Server versus distributed Reputation Servers
Summary
18. Security
Groove versus email
Why secure email is a failure
The solution: A Groove shared space
Security characteristics of a shared space
Mutually-trusting shared spaces
Anatomy of a mutually-trusting shared space
The key to mutual trust
Mutually-suspicious shared spaces
Message fanout
Fetching lost messages
Shared space formation and trusted authentication
Inviting people into shared spaces
The New-Member-Added delta message
Key versioning and key dependencies
Central control and local autonomy
Practical security for real-world collaboration
Taxonomy of Groove keys
19. Interoperability Through Gateways
Why unification?
Why not an ÜberNetwork?
Why not an ÜberClient?
Why not just use XML?
One network with a thousand faces
Well-known networks and their roles
Freenet
Gnutella
Mojo Nation
Free Haven and Publius
Problems creating gateways
Problems with inserts
Problems with requests
Freenet
Gnutella
Mojo Nation
Publius
Free Haven
Gateway implementation
Existing projects
Conclusion
Acknowledgments
20. Afterword
Precedents and parries
Who gets to innovate?
A clean sweep?
A. Directory of Peer-to-Peer Projects
B. Contributors
Index
People also search for (Ebook) Peer to Peer Harnessing the Power of Disruptive Technologies 1st Edition:
the power and potential of peer support in workplace interventions
harness the power of
power of peer
peer-to-peer harnessing the power of disruptive technologies pdf
harness the power of data
Tags: Andy Oram, Harnessing, Power, Disruptive Technologies