The document discusses security aspects of distributed systems. It outlines terminology related to distributed databases and security. It then reviews two literature papers. The first proposes using hash functions to test data integrity in distributed systems. The second introduces an approach to security infrastructure without using proxy certificates, simplifying development and use. It concludes the first approach can help evaluate trust in distributed systems and adding a global hash store improves integrity detection.