메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Survey of six myths and oversights about distributed hash tables' security

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; INFORMATION MANAGEMENT; SECURITY OF DATA; USER INTERFACES;

EID: 35948933907     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2007.77     Document Type: Conference Paper
Times cited : (3)

References (32)
  • 1
    • 35948940715 scopus 로고    scopus 로고
    • chord-0.1-20060908.tar.bz2, utils/id_utils.C, line 358.
    • chord-0.1-20060908.tar.bz2, utils/id_utils.C, line 358.
  • 2
    • 35948986235 scopus 로고    scopus 로고
    • The Chord/DHash project
    • The Chord/DHash project, http://pdos.csail.mit.edu/chord/.
  • 3
    • 35948947718 scopus 로고    scopus 로고
    • email
    • Digital ids for secure email, http://www.verisign.com/products-services/ security-services/pki/pki-application/email-digital-id/index.html.
    • Digital ids for secure
  • 4
    • 35948951027 scopus 로고    scopus 로고
    • Pastry - a scalable, decentralized, self-organizing and fault-tolerant substrate for peer-to-peer applications, http://freepastry.org/.
    • Pastry - a scalable, decentralized, self-organizing and fault-tolerant substrate for peer-to-peer applications, http://freepastry.org/.
  • 6
    • 35948978001 scopus 로고    scopus 로고
    • P2P reputation management: Probabilistic estimation vs. social networks
    • K. Aberer and Z. Despotovic. P2P reputation management: Probabilistic estimation vs. social networks. Journal of Computer Networks, 2005.
    • (2005) Journal of Computer Networks
    • Aberer, K.1    Despotovic, Z.2
  • 7
    • 0035747559 scopus 로고    scopus 로고
    • Managing trust in a peer-2-peer information system
    • Atlanta, Georgia, USA, ACM press
    • Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer information system. In Conference on Information and Knowledge Management, pages 310-317, Atlanta, Georgia, USA, 2001. ACM press.
    • (2001) Conference on Information and Knowledge Management , pp. 310-317
    • Aberer, K.1    Despotovic, Z.2
  • 8
    • 0003605208 scopus 로고    scopus 로고
    • Security Engineering, a guide to building dependable distribut ed systems
    • chapter 4, Wiley
    • Ross Anderson. Security Engineering, a guide to building dependable distribut ed systems, chapter 4, Access Control. Wiley, 2000.
    • (2000) Access Control
    • Anderson, R.1
  • 12
    • 35948956192 scopus 로고    scopus 로고
    • daemon9, route, and infinity. IP-spoofing demystified (trust-relationshipexploitation). PhrackMagazine, 1996.
    • daemon9, route, and infinity. IP-spoofing demystified (trust-relationshipexploitation). PhrackMagazine, 1996.
  • 13
    • 19944368546 scopus 로고    scopus 로고
    • Countering identity farms in reputation systems for P2P networks
    • Technical report, Arizona State University
    • Prashant Dewan. Countering identity farms in reputation systems for P2P networks. Technical report, Arizona State University, 2004.
    • (2004)
    • Dewan, P.1
  • 18
    • 35948958483 scopus 로고    scopus 로고
    • Calif, man pleads guilty to felony hacking
    • Jan. 23
    • Dan Goodin. Calif, man pleads guilty to felony hacking. Breitbart.com, Jan. 23 2006.
    • (2006) Breitbart.com
    • Goodin, D.1
  • 19
    • 35948981063 scopus 로고    scopus 로고
    • Kai Hwang and Runfang Zhou. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. Manuscript submitted to IEEE Transactions on Parallel and Distributed Systems.
    • Kai Hwang and Runfang Zhou. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. Manuscript submitted to IEEE Transactions on Parallel and Distributed Systems.
  • 20
    • 33751098596 scopus 로고    scopus 로고
    • Dutch botnet bigger than expected
    • Oct 21
    • Gregg Keizer. Dutch botnet bigger than expected. InformationWeek, Oct 21 2005. http://www.informationweek.com/story/showArticle.jhtml?articleID= 172303265.
    • (2005) InformationWeek
    • Keizer, G.1
  • 21
    • 35948946008 scopus 로고    scopus 로고
    • Dutch botnet susptects ran 1.5 milion machines
    • Oct 21
    • Gregg Keizer. Dutch botnet susptects ran 1.5 milion machines. TechWeb, Oct 21 2005. http://www.techweb.com/wire/security/172303160.
    • (2005) TechWeb
    • Keizer, G.1
  • 23
    • 35948992902 scopus 로고    scopus 로고
    • Attack of the zombie computers is growing threat
    • 7 Jan
    • John Markoff. Attack of the zombie computers is growing threat. The New York Times, 7 Jan. 2007.
    • (2007) The New York Times
    • Markoff, J.1
  • 27
    • 84947265806 scopus 로고    scopus 로고
    • Emil Sit and Robert Morris. Security considerations for peer-to-peer distributed hash tables. In Lecture Notes in Computer Science, Revised Papers form the First International Workshop on Peer-to-Peer Systems, pages 261-269, 2002.
    • Emil Sit and Robert Morris. Security considerations for peer-to-peer distributed hash tables. In Lecture Notes in Computer Science, Revised Papers form the First International Workshop on Peer-to-Peer Systems, pages 261-269, 2002.
  • 30
    • 0034782005 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup service for internet applications
    • San Deigo, CA
    • Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM 2001, pages 149-160, San Deigo, CA, 2001.
    • (2001) ACM SIGCOMM 2001 , pp. 149-160
    • Stoica, I.1    Morris, R.2    Karger, D.3    Frans Kaashoek, M.4    Balakrishnan, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.