Notes
1. THere's also a third meaning for the term “commerce” per Merriam Webster, but that meaning does not exactly bode well with the scope of this book.
2. http://en.wikipedia.org/wiki/History_of_banking
3. http://en.wikipedia.org/wiki/Credit_card
4. Forrester Report on Mobile Payment.
5. Orfali, R. et al., The Essential Client/Server Survival Guide. Wiley 1997. p13–14.
6. Chakrabarti, A.Grid Computing Security, Springer 2007.
8. Stoica, I., et al., “A Scalable Peer-to-peer Lookup Service for Internet Applications,” in Proc. ACM SIGCOMM, San Diego, 2001.
9. Ratnasamy, S., A Scalable Content Addressable network, Ph.D. Thesis, University of California, Berkeley, 2002.
10. http://csrc.nist.gov/rbac/
11. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
12. Sybil attacks are the class of attacks where a reputation system is subverted by forging identities within a P2P network.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access