메뉴 건너뛰기




Volumn 408, Issue 2-3, 2008, Pages 199-207

Pipelined algorithms to detect cheating in long-term grid computations

Author keywords

Grid computing; Parallel algorithms; Pipelined algorithms; Security

Indexed keywords

ALGORITHMS; ECONOMIC ANALYSIS; GRID COMPUTING; RISK ASSESSMENT;

EID: 55049105395     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2008.08.008     Document Type: Article
Times cited : (15)

References (23)
  • 2
    • 0029534489 scopus 로고    scopus 로고
    • R. Beigel, W. Hurwood, N. Kahale, Fault diagnosis in a flash, in: IEEE Symposium on Foundations of Computer Science, FOCS, 1995, pp. 571-580
    • R. Beigel, W. Hurwood, N. Kahale, Fault diagnosis in a flash, in: IEEE Symposium on Foundations of Computer Science, FOCS, 1995, pp. 571-580
  • 3
    • 0038112683 scopus 로고    scopus 로고
    • R. Beigel, G. Margulis, D.A. Spielman, Fault diagnosis in a small constant number of parallel testing rounds, in: ACM Symposium on Parallel Algorithms and Architectures, SPAA, 1993, pp. 21-29
    • R. Beigel, G. Margulis, D.A. Spielman, Fault diagnosis in a small constant number of parallel testing rounds, in: ACM Symposium on Parallel Algorithms and Architectures, SPAA, 1993, pp. 21-29
  • 5
    • 0024867752 scopus 로고    scopus 로고
    • M. Blum, S. Kannan, Designing programs that check their work, in: Proc. 21st ACM Symp. Theory of Comp., Seattle, Washington, 1989, pp. 86-97
    • M. Blum, S. Kannan, Designing programs that check their work, in: Proc. 21st ACM Symp. Theory of Comp., Seattle, Washington, 1989, pp. 86-97
  • 6
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • Blum M., and Kannan S. Designing programs that check their work. J. ACM 42 1 (1995) 269-291
    • (1995) J. ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 7
    • 0000619172 scopus 로고
    • Self-testing/correcting with applications to numerical problems
    • Blum M., Luby M., and Rubinfeld R. Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47 3 (1993) 549-595
    • (1993) J. Comput. Syst. Sci. , vol.47 , Issue.3 , pp. 549-595
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 8
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Cachin C., Micali S., and Stadler M. Computationally private information retrieval with polylogarithmic communication. Lecture Notes in Computer Science vol. 1592 (1999) 402-414
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 10
    • 26444461543 scopus 로고    scopus 로고
    • Searching for high-value rare events with uncheatable grid computing
    • 3rd Applied Cryptography and Network Security Conference. ACNS, Springer
    • Du W., and Goodrich M.T. Searching for high-value rare events with uncheatable grid computing. 3rd Applied Cryptography and Network Security Conference. ACNS. Lecture Notes in Computer Science vol. 3531 (2005), Springer 122-137
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 122-137
    • Du, W.1    Goodrich, M.T.2
  • 11
    • 2442421200 scopus 로고    scopus 로고
    • W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in: The 24th International Conference on Distributed Computing Systems, ICDCS'04, Tokyo, Japan, March 23-26, 2004, pp. 4-11
    • W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in: The 24th International Conference on Distributed Computing Systems, ICDCS'04, Tokyo, Japan, March 23-26, 2004, pp. 4-11
  • 12
    • 0032761918 scopus 로고    scopus 로고
    • U. Finkler, K. Mehlhorn, Checking priority queues, in: Proc. 10th ACM-SIAM Symp. on Discrete Algorithms, 1999, pp. S901-S902
    • U. Finkler, K. Mehlhorn, Checking priority queues, in: Proc. 10th ACM-SIAM Symp. on Discrete Algorithms, 1999, pp. S901-S902
  • 13
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computations
    • Topics in Cryptology-CT-RSA, The Cryptographer's Track at the RSA Conference, Proceedings, Springer
    • Golle P., and Mironov I. Uncheatable distributed computations. Topics in Cryptology-CT-RSA, The Cryptographer's Track at the RSA Conference, Proceedings. Lecture Notes in Computer Science vol. 2020 (2001), Springer 425-440
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 14
    • 84949235873 scopus 로고    scopus 로고
    • Secure distributed computing in a commercial environment
    • Proceedings of Financial Crypto 2001. Syverson P. (Ed), Springer-Verlag
    • Golle P., and Stubblebine S. Secure distributed computing in a commercial environment. In: Syverson P. (Ed). Proceedings of Financial Crypto 2001. Lecture Notes in Computer Science vol. 2339 (2001), Springer-Verlag 289-304
    • (2001) Lecture Notes in Computer Science , vol.2339 , pp. 289-304
    • Golle, P.1    Stubblebine, S.2
  • 15
    • 26444620946 scopus 로고    scopus 로고
    • Cheaters bow to peer pressure
    • Kahney L. Cheaters bow to peer pressure. Wired Magazine Feb. 15 (2001)
    • (2001) Wired Magazine , Issue.Feb. 15
    • Kahney, L.1
  • 17
    • 0038754189 scopus 로고    scopus 로고
    • D. Kratsh, R. McConnell, K. Mehlhorn, J. Spinrad, Certifying algorithms for recognizing interval and permutation graphs, in: Proc. ACM-SIAM Symp. on Discrete Algorithms, 2003
    • D. Kratsh, R. McConnell, K. Mehlhorn, J. Spinrad, Certifying algorithms for recognizing interval and permutation graphs, in: Proc. ACM-SIAM Symp. on Discrete Algorithms, 2003
  • 18
    • 0003013846 scopus 로고
    • New directions in testing
    • Distributed Computing and Cryptography, American Mathematics Society
    • Lipton R. New directions in testing. Distributed Computing and Cryptography. DIMACS Series in Discrete Mathematics and Theoretical Computer Science vol. 2 (1991), American Mathematics Society 191-202
    • (1991) DIMACS Series in Discrete Mathematics and Theoretical Computer Science , vol.2 , pp. 191-202
    • Lipton, R.1
  • 19
    • 55049117237 scopus 로고    scopus 로고
    • R. Rubinfeld, Designing checkers for programs that run in parallel. Technical Report TR-090-040, International Computer Science Institute, Berkeley, CA, Aug. 1990
    • R. Rubinfeld, Designing checkers for programs that run in parallel. Technical Report TR-090-040, International Computer Science Institute, Berkeley, CA, Aug. 1990
  • 20
    • 0025660767 scopus 로고    scopus 로고
    • G.F. Sullivan, G.M. Masson, Using certification trails to achieve software fault tolerance, in: Digest 1990 Fault Tolerant Comp. Symp., 1990, pp. 423-431
    • G.F. Sullivan, G.M. Masson, Using certification trails to achieve software fault tolerance, in: Digest 1990 Fault Tolerant Comp. Symp., 1990, pp. 423-431
  • 22
    • 84954426305 scopus 로고    scopus 로고
    • D. Szajda, B. Lawson, J. Owen, Hardening functions for large scale distributed computations, in: IEEE Symposium on Security and Privacy, 2003
    • D. Szajda, B. Lawson, J. Owen, Hardening functions for large scale distributed computations, in: IEEE Symposium on Security and Privacy, 2003
  • 23
    • 84974573487 scopus 로고    scopus 로고
    • R.O.W. Aiello, S. Bhatt, S. Rajagopalan, Fast verification of any remote procedure call: Short witness-indistinguishable one-round proofs for np, in: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, July 2000, pp. 463-474
    • R.O.W. Aiello, S. Bhatt, S. Rajagopalan, Fast verification of any remote procedure call: Short witness-indistinguishable one-round proofs for np, in: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, July 2000, pp. 463-474


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.