ROWSTRON A,DRUSCHEL P.Storage management and caching in PAST,a large scale,persistent peer-to-peer storage utility[Z].ACM SOSP'01,Banff,Canada,2001.
[2]
JIANG Song,ZHANG Xiao-dong.Flood trail; An efficient file search technique in unstructured peer-to-peer systems[Z]. 2003 IEEE Globecom Confernece,San Fransisco,California,2003.
[3]
STOICA I,MORRIS R,KARGER D,et al.Chord: A scalable peer-to-peer lookup service for Internet applications[Z]. ACM SIGCOMM,San Diego,California,2001.
[4]
Sun Microsystems,Inc.JXTA v2.0 Protocols Specification[EB/OL].http://spec.jxta.org,2003-02-27/2004-12-10.
[5]
蔡永泉,肖创柏.基于属性的私有密钥证书的安全框架及其实现[J].北京工业大学学报,2004,30(1):68-70. CAI Yong-quan,XIAO Chuang-bai.Security frame of private key certificate based attribute and its realization[J].Journal of Beijing University of Technology,2004,30(1):68-70.