메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Resource management using untrusted auctioneers in a grid economy

Author keywords

[No Author keywords available]

Indexed keywords

COMBINATORIAL MATHEMATICS; COMPUTER ARCHITECTURE; COMPUTER SOFTWARE; PERSONAL COMPUTERS; RESOURCE ALLOCATION;

EID: 38449121112     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/E-SCIENCE.2006.261158     Document Type: Conference Paper
Times cited : (16)

References (33)
  • 3
    • 33644596007 scopus 로고    scopus 로고
    • Resource Discovery and Negotiation in the NOMAD System
    • Proceedings of ACSC2005, Newcastle, NSW, Australia, January
    • K. Bubendorfer and J. H. Hine. Resource Discovery and Negotiation in the NOMAD System. In in Proceedings of ACSC2005, The Twenty Eigth Australasian Computer Science Conference, volume 27, Newcastle, NSW, Australia, January 2005.
    • (2005) The Twenty Eigth Australasian Computer Science Conference , vol.27
    • Bubendorfer, K.1    Hine, J.H.2
  • 5
    • 33751108999 scopus 로고    scopus 로고
    • K. Bubendorfer, I. Welch, and B. Chard. Trustworthy Auctions for Grid-style Economies. In In the proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid(CCGrid06), 1, pages 386-390, Singapore, May 2006. IEEE.
    • K. Bubendorfer, I. Welch, and B. Chard. Trustworthy Auctions for Grid-style Economies. In In the proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid(CCGrid06), volume 1, pages 386-390, Singapore, May 2006. IEEE.
  • 7
    • 33744465296 scopus 로고    scopus 로고
    • C.-H. Chien, P. H.-M. Chang, and V.-W. Soo. Market-Oriented Multiple Resource Scheduling in Grid Computing Environments. In Proceedings of Advanced Information Networking and Applications (AINA'05), 1, pages 867-872, Taipei, March 2005.
    • C.-H. Chien, P. H.-M. Chang, and V.-W. Soo. Market-Oriented Multiple Resource Scheduling in Grid Computing Environments. In Proceedings of Advanced Information Networking and Applications (AINA'05), volume 1, pages 867-872, Taipei, March 2005.
  • 8
    • 0038011186 scopus 로고    scopus 로고
    • E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 207-216, New York, NY, USA, 2002. ACM Press.
    • E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 207-216, New York, NY, USA, 2002. ACM Press.
  • 9
    • 84936992039 scopus 로고    scopus 로고
    • T. Dimitrakos, D. M. Randal, F. Yuan, M. Gaeta, G. Laria, P. Ritrovato, B. Serhan, S. Wesner, and K. Wulf. An Emerging Architecture Enabling Grid Based Application Service Provision. In Seventh International Enterprise Distributed Object Computing Conference (EDOC'03), pages 240-251, Brisbane, Queensland, Australia, September 2003.
    • T. Dimitrakos, D. M. Randal, F. Yuan, M. Gaeta, G. Laria, P. Ritrovato, B. Serhan, S. Wesner, and K. Wulf. An Emerging Architecture Enabling Grid Based Application Service Provision. In Seventh International Enterprise Distributed Object Computing Conference (EDOC'03), pages 240-251, Brisbane, Queensland, Australia, September 2003.
  • 10
    • 0042031164 scopus 로고    scopus 로고
    • P. Eerola, B. Konya, O. Smirnova, T. Ekelof, M. Ellert, J. R. Hansen, J. L. Neilsen, A. Waananen, A. Konstantantinov, and F. Ould-Saada. Building a Production Grid in Scandinavia. IEEE Internet Computing, 7(4):27-35, 2003.
    • P. Eerola, B. Konya, O. Smirnova, T. Ekelof, M. Ellert, J. R. Hansen, J. L. Neilsen, A. Waananen, A. Konstantantinov, and F. Ould-Saada. Building a Production Grid in Scandinavia. IEEE Internet Computing, 7(4):27-35, 2003.
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • July
    • T. Elgamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):69-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 69-472
    • Elgamal, T.1
  • 12
    • 0029220609 scopus 로고
    • The Design and Implementation of a Secure Auction Service
    • Oakland, California, USA, IEEE Computer Society Press
    • M. Franklin and M. Reiter. The Design and Implementation of a Secure Auction Service. In Proceedings of the IEEE Symposium on Security and Privacy, pages 2-14, Oakland, California, USA., 1995. IEEE Computer Society Press.
    • (1995) Proceedings of the IEEE Symposium on Security and Privacy , pp. 2-14
    • Franklin, M.1    Reiter, M.2
  • 14
    • 70350641953 scopus 로고    scopus 로고
    • M. M. Halldórsson. Approximations of Weighted Independent Set and Hereditary Subset Problems. In Computing and Combinatorics, 5th Annual International Conference, COCOON 99, Lecture Notes in Computer Science 1627 Springer, pages 261-270, 1999.
    • M. M. Halldórsson. Approximations of Weighted Independent Set and Hereditary Subset Problems. In Computing and Combinatorics, 5th Annual International Conference, COCOON 99, Lecture Notes in Computer Science 1627 Springer, pages 261-270, 1999.
  • 17
    • 27644456168 scopus 로고    scopus 로고
    • Enabling virtual organisations in mobile networks
    • London, UK, October
    • P. Komisarczuk, K. Bubendorfer, and K. Chard. Enabling virtual organisations in mobile networks. In IEE 3G2004 Conference, pages 123-127, London, UK, October 2004.
    • (2004) IEE 3G2004 Conference , pp. 123-127
    • Komisarczuk, P.1    Bubendorfer, K.2    Chard, K.3
  • 18
    • 0242550383 scopus 로고    scopus 로고
    • Truth revelation in approximately efficient combinatorial auctions
    • D. Lehmann, L. I. Oćallaghan, and Y. Shoham. Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM, 49(5):577-602, 2002.
    • (2002) Journal of the ACM , vol.49 , Issue.5 , pp. 577-602
    • Lehmann, D.1    Oćallaghan, L.I.2    Shoham, Y.3
  • 19
    • 84957026937 scopus 로고    scopus 로고
    • Secure vickrey auctions without threshold trust
    • M. Blaze, editor, Financial Cryptography, of, Springer
    • H. Lipmaa, N. Asokan, and V. Niemi. Secure vickrey auctions without threshold trust. In M. Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 87-101. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2357 , pp. 87-101
    • Lipmaa, H.1    Asokan, N.2    Niemi, V.3
  • 21
    • 38449097993 scopus 로고    scopus 로고
    • T. W. Malone, R. E. Fikes, K. R. Grant, and M. T. Howard. Enterprise: A Market-like Task Scheduler for Distributed Computing Environments. In H. B.A, editor, The Ecology of Computation, pages 177-205. Elsevier Science Publishers (North-Holland), 1988.
    • T. W. Malone, R. E. Fikes, K. R. Grant, and M. T. Howard. Enterprise: A Market-like Task Scheduler for Distributed Computing Environments. In H. B.A, editor, The Ecology of Computation, pages 177-205. Elsevier Science Publishers (North-Holland), 1988.
  • 26
    • 0003550873 scopus 로고
    • Computationally Manageable Combinatorial Auctions
    • Technical Report 95-09, DIMACS, Center for Discrete Mathematics and Theoretical Computer Science, Rutgers, USA, Apr
    • M. H. Rothkopf, A. Pekeč, and R. M. Harstad. Computationally Manageable Combinatorial Auctions. Technical Report 95-09, DIMACS, Center for Discrete Mathematics and Theoretical Computer Science, Rutgers, USA, Apr. 1995.
    • (1995)
    • Rothkopf, M.H.1    Pekeč, A.2    Harstad, R.M.3
  • 27
    • 38449117952 scopus 로고    scopus 로고
    • T. Sandholm. Limitations of Vickrey Auction in Computational Multiagent Systems. In In Proceedings of the Second International Conference on Multiagent Systems (ICMAS96), Kyoto, Japan, pages 299-306, December 1996.
    • T. Sandholm. Limitations of Vickrey Auction in Computational Multiagent Systems. In In Proceedings of the Second International Conference on Multiagent Systems (ICMAS96), Kyoto, Japan, pages 299-306, December 1996.
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 29
    • 84957038963 scopus 로고    scopus 로고
    • Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing
    • Southampton, Bermuda, March
    • K. Suzuki and M. Yokoo. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing. In FC2002: Proceedings of the Sixth International Conference on Financial Cryptography, volume LNCS 2357, pages 44-56, Southampton, Bermuda, March 2002.
    • (2002) FC2002: Proceedings of the Sixth International Conference on Financial Cryptography , vol.LNCS 2357 , pp. 44-56
    • Suzuki, K.1    Yokoo, M.2
  • 30
    • 35248879821 scopus 로고    scopus 로고
    • Secure generalized vickery auction using homomorphic encryption
    • Financial Cryptography, 7th International Conference, FC 2003, of, Springer
    • K. Suzuki and M. Yokoo. Secure generalized vickery auction using homomorphic encryption. In Financial Cryptography, 7th International Conference, FC 2003, volume 2742 of Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2742
    • Suzuki, K.1    Yokoo, M.2
  • 32


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.