메뉴 건너뛰기




Volumn 192, Issue 2, 2008, Pages 17-29

Securing Ad Hoc Storage through Probabilistic Cooperation Assessment

Author keywords

ad hoc storage; cooperation; self organizing networks; selfishness; storage availability

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; NETWORK PROTOCOLS; PROBABILISTIC LOGICS; PUBLIC KEY CRYPTOGRAPHY; SELF ORGANIZING MAPS; STORAGE ALLOCATION (COMPUTER); VERIFICATION;

EID: 44349160835     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2008.05.003     Document Type: Article
Times cited : (3)

References (13)
  • 1
    • 0029235432 scopus 로고    scopus 로고
    • F. Bennett, T. Richardson, and A. Harter. Teleporting - making applications mobile. In IEEE Computer Society Press, editor, IEEE Workshop on Mobile Computing Systems and Applications, pages 82-84, Santa Cruz, California, December 1994
    • F. Bennett, T. Richardson, and A. Harter. Teleporting - making applications mobile. In IEEE Computer Society Press, editor, IEEE Workshop on Mobile Computing Systems and Applications, pages 82-84, Santa Cruz, California, December 1994
  • 2
    • 33947651908 scopus 로고    scopus 로고
    • Mark Caronni and Marcel Waldvogel. Establishing Trust in Distributed Storage Providers. In Third IEEE P2P Conference, Linkoping, 20003, 2003
    • Mark Caronni and Marcel Waldvogel. Establishing Trust in Distributed Storage Providers. In Third IEEE P2P Conference, Linkoping, 20003, 2003
  • 5
    • 44349180237 scopus 로고    scopus 로고
    • J. Douceur. The Sybil attack. In The 1st International Workshop on Peer-to-Peer Systems (IPTPS02), MIT Faculty Club, Cambridge, MA, 2002
    • J. Douceur. The Sybil attack. In The 1st International Workshop on Peer-to-Peer Systems (IPTPS02), MIT Faculty Club, Cambridge, MA, 2002
  • 6
    • 44349116075 scopus 로고    scopus 로고
    • D.G. Filho and P.S.L.M. Barreto. Demonstrating data possession and uncheatable data transfer. In IACR Cryptology ePrint Archive, 2006
    • D.G. Filho and P.S.L.M. Barreto. Demonstrating data possession and uncheatable data transfer. In IACR Cryptology ePrint Archive, 2006
  • 7
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Goldschlag D., Reed M., and Syverson P. Onion routing for anonymous and private internet connections. Comm. ACM 42 2 (1999) 39-41
    • (1999) Comm. ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 8
    • 44349148669 scopus 로고    scopus 로고
    • Marc Olivier Killijian, Michel Banâtre, Yves Roudier, David Powell, and Paul Couderc. Collaborative backup for dependable mobile applications. In MPAC'04, 2nd International Workshop on Middleware for Pervasive and Ad-Hoc Computing, October 18th - 22nd, 2004, Toronto, Canada / Proceedings published in ACM International Conference Proceeding Series, ACM 20 04, ISBN:1-58113-951-9, Oct 2004.
    • Marc Olivier Killijian, Michel Banâtre, Yves Roudier, David Powell, and Paul Couderc. Collaborative backup for dependable mobile applications. In MPAC'04, 2nd International Workshop on Middleware for Pervasive and Ad-Hoc Computing, October 18th - 22nd, 2004, Toronto, Canada / Proceedings published in ACM International Conference Proceeding Series, ACM 20 04, ISBN:1-58113-951-9, Oct 2004.
  • 9
    • 85077532807 scopus 로고    scopus 로고
    • Mark Lillibridge, Sameh Elnikety, Andrew Birrel, Mike Burrows, and Michael Isard. A Cooperative Internet Backup Scheme. In Usenix Annual Technical Conference (General Track), pp. 29-41, Jun 2003
    • Mark Lillibridge, Sameh Elnikety, Andrew Birrel, Mike Burrows, and Michael Isard. A Cooperative Internet Backup Scheme. In Usenix Annual Technical Conference (General Track), pp. 29-41, Jun 2003
  • 10
    • 84958977900 scopus 로고    scopus 로고
    • N. Marmasse and C. Schmandt. Location-aware information delivery with commotion. In Springer Verlag, editor, Second International Symposium on Handheld and Ubiquitous Computing, HUC 2000, pages 157-171, Bristol, UK, September 2000
    • N. Marmasse and C. Schmandt. Location-aware information delivery with commotion. In Springer Verlag, editor, Second International Symposium on Handheld and Ubiquitous Computing, HUC 2000, pages 157-171, Bristol, UK, September 2000
  • 11
    • 47849088458 scopus 로고    scopus 로고
    • N. Oualha and Y. Roudier. A game theoretic model of a protocol for data possession verification. In The Third IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing, Helsinki, Finland, June 2007
    • N. Oualha and Y. Roudier. A game theoretic model of a protocol for data possession verification. In The Third IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing, Helsinki, Finland, June 2007
  • 12
    • 39049144332 scopus 로고    scopus 로고
    • G. Yang, L. Chen, T. Sun, B. Zhou, and M. Gerla. Ad-hoc Storage Overlay System (ASOS): A delay-tolerant approach in MANETs. In The Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS'06), Vancouver, Canada, 2006
    • G. Yang, L. Chen, T. Sun, B. Zhou, and M. Gerla. Ad-hoc Storage Overlay System (ASOS): A delay-tolerant approach in MANETs. In The Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS'06), Vancouver, Canada, 2006
  • 13
    • 39049084873 scopus 로고    scopus 로고
    • W. Zhao, Y. Chen, M. Ammar, M. Corner, B.N. Levine, and E. Zegura. Capacity enhancement using throwboxes in DTNs. In IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), Vancouver, Canada, October 2006
    • W. Zhao, Y. Chen, M. Ammar, M. Corner, B.N. Levine, and E. Zegura. Capacity enhancement using throwboxes in DTNs. In IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), Vancouver, Canada, October 2006


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.