A peer-to-peer network propagates searches from client to client.
Resources within each client are selectively searched in response to
authentication and authorization processes. Authentication information
may be included in a search request or may be performed by an
authentication process external to the client. Authorization is performed
by a process external to the client. Only after authentication or
authorization may resources of any particular client be accessed. The
system allows for secure propagated searches and resource access in a
peer-to-peer network environment. The network may further include a
server for maintaining a list of clients connected to the peer-to-peer
network in order to more efficiently facilitate peer-to-peer
communications.