메뉴 건너뛰기




Volumn , Issue , 2006, Pages 57-64

The effect of replica placement on routing robustness in distributed hash tables

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE;

EID: 67549104856     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/P2P.2006.44     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 1
    • 30144446253 scopus 로고    scopus 로고
    • A novel methodology for constructing secure multipath overlays
    • Nov
    • M.S. Artigas, P.G. Lopez, A.F. Gomez Skarmeta, “A Novel Methodology for Constructing Secure Multipath Overlays,” IEEE Internet Computing, vol. 9, no. 6, pp. 50-7, Nov. 2005.
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 50-57
    • Artigas, M.S.1    Lopez, P.G.2    Gomez Skarmeta, A.F.3
  • 2
    • 84978382732 scopus 로고    scopus 로고
    • Secure routing for structured peer-to-peer overlay networks
    • Boston, Massachusetts,. Dec
    • M. Castro, P. Druschel, A. Ganesh, A. Rowston, D. Wallach, “Secure Routing for Structured Peer-to-Peer Overlay Networks,” In Proc. OSDI 02, Boston, Massachusetts, pp. 299-314, Dec. 2002.
    • (2002) Proc. OSDI 02 , pp. 299-314
    • Castro, M.1    Druschel, P.2    Ganesh, A.3    Rowston, A.4    Wallach, D.5
  • 3
    • 84947242606 scopus 로고    scopus 로고
    • Dynamic replica placement for scalable content delivery
    • Cambridge, Massachusetts,. Mar
    • Y. Chen, R. Katz, J. Kubiatowicz, “Dynamic Replica Placement for Scalable Content Delivery,” In Proc. IPTPS 02, Cambridge, Massachusetts, pp. 306-318, Mar. 2002.
    • (2002) Proc. IPTPS 02 , pp. 306-318
    • Chen, Y.1    Katz, R.2    Kubiatowicz, J.3
  • 5
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Cambridge, Massachusetts,. Mar
    • J. Douceur, “The Sybil Attack,” In Proc. IPTPS 02, Cambridge, Massachusetts, pp. 251-260, Mar. 2002.
    • (2002) Proc. IPTPS 02 , pp. 251-260
    • Douceur, J.1
  • 6
    • 0034823063 scopus 로고    scopus 로고
    • Large-scale simualtion of replica placement algorithms for a serverless distributed file System
    • Cincinnati, Ohio,. Aug
    • J. Douceur, R. Wattenhofer, “Large-scale Simualtion of Replica Placement Algorithms for a Serverless Distributed File System,” In Proc. MASCOTS 01, Cincinnati, Ohio, pp. 311-319, Aug. 2001.
    • (2001) Proc. MASCOTS 01 , pp. 311-319
    • Douceur, J.1    Wattenhofer, R.2
  • 8
    • 27944435841 scopus 로고    scopus 로고
    • On the impact of replica placement to the reliability of distributed block storage systems
    • Columbus, Ohio,. June
    • Q. Lian, W. Chen, Z. Zhang, “On the Impact of Replica Placement to the Reliability of Distributed Block Storage Systems,” In Proc. IEEE ICDCS 05, Columbus, Ohio, pp. 187-196, June 2005.
    • (2005) Proc. IEEE ICDCS 05 , pp. 187-196
    • Lian, Q.1    Chen, W.2    Zhang, Z.3
  • 9
    • 51049096980 scopus 로고    scopus 로고
    • The effectiveness of realistic replication strategies on quality of availability for peer-to-peer systems
    • Linkoping, Sweden,. Sep
    • G. On, J. Schmitt, R. Steinmetz, “The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems,” In Proc. IEEE P2P 03, Linkoping, Sweden, pp. 57-64, Sep. 2003.
    • (2003) Proc. IEEE P2P 03 , pp. 57-64
    • On, G.1    Schmitt, J.2    Steinmetz, R.3
  • 10
    • 0030652065 scopus 로고    scopus 로고
    • Accessing nearby copies of replicated objects in a distributed environment
    • Rhode Island,. June
    • C.G. Plaxton, R. Rajaraman, A. Richa, “Accessing Nearby Copies of Replicated Objects in a Distributed Environment,” In Proc. ACM SPAA, Newport, Rhode Island, pp. 311-320, June 1997.
    • (1997) Proc. ACM SPAA, Newport , pp. 311-320
    • Plaxton, C.G.1    Rajaraman, R.2    Richa, A.3
  • 12
    • 77951438838 scopus 로고    scopus 로고
    • Defending against eclipse attacks on overlay networks
    • Leuven, Belgium,. Sep
    • A. Singh, M. Castro, P. Druschel, A. Rowstron, “Defending Against Eclipse Attacks on Overlay Networks,” In Proc. ACM SIGOPS 04, Leuven, Belgium, pp. 115-120, Sep. 2004.
    • (2004) Proc. ACM SIGOPS 04 , pp. 115-120
    • Singh, A.1    Castro, M.2    Druschel, P.3    Rowstron, A.4
  • 13
    • 84947265806 scopus 로고    scopus 로고
    • Security considerations for peer-to-peer distributed hash tables
    • Cambridge, Massachusetts,. Mar
    • E. Sit, R. Morris, “Security Considerations for Peer-to-Peer Distributed Hash Tables,” In Proc. IPTPS 02, Cambridge, Massachusetts, pp. 261-9, Mar. 2002.
    • (2002) Proc. IPTPS 02 , pp. 261-269
    • Sit, E.1    Morris, R.2
  • 14
    • 21644471550 scopus 로고    scopus 로고
    • Vulnerabilities and security threats in structured peer-to-peer systems: A quantitative analysis
    • Tuscon, Arizona,. Dec
    • M. Srivatsa, L. Liu, “Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis,” In Proc. IEEE ACSAC 04, Tuscon, Arizona, pp.252-261, Dec. 2004.
    • (2004) Proc. IEEE ACSAC 04 , pp. 252-261
    • Srivatsa, M.1    Liu, L.2
  • 16
    • 0034782005 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup service for internet applications
    • San Diego, California,. Aug
    • I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” In Proc. ACM SIGCOMM 01, San Diego, California, pp. 149-160, Aug. 2001.
    • (2001) Proc. ACM SIGCOMM 01 , pp. 149-160
    • Stoica, I.1    Morris, R.2    Karger, D.3    Kaashoek, M.F.4    Balakrishnan, H.5
  • 17


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.