Security architecture and operations for peer-to-peer networks |
|
Recommendation ITU-T X.1162 describes a general security-related architectural model which can be applied in various peer-to-peer (P2P) networks. Based on the architectural model, this Recommendation identifies primitive operations for generic P2P networks. Non-generic and application-dependent operations are not described in this Recommendation. For each primitive operation, the relationship between the security requirements and operations is described. In addition, the relationship between the security functions and operations is described. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9453 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1160-X.1164: Peer-to-peer security |
Approval date: |
2008-05-29 |
Provisional name: | X.p2p-2 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1162 (05/2008)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Current and new challenges for public-key infrastructure standardization
|
2014
|
here
|
|