메뉴 건너뛰기




Volumn 7, Issue 4, 2009, Pages 555-573

Defeating colluding nodes in desktop grid computing platforms

Author keywords

Collusion; Desktop grids; Replication; Volunteer computing

Indexed keywords

COMPUTING PLATFORM; COMPUTING PROJECTS; DESKTOP GRID; DESKTOP GRID COMPUTING; MAJORITY VOTING; MALICIOUS NODES; POST PROCESS; SIMPLE MAJORITY; STATISTICAL APPROACH; TECHNICAL CONTROL; VOLUNTEER COMPUTING;

EID: 77949574462     PISSN: 15707873     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10723-009-9124-5     Document Type: Article
Times cited : (17)

References (21)
  • 3
    • 10644223387 scopus 로고    scopus 로고
    • Computing on large-scale distributed systems: XtremWeb architec-ture, programming models, security, tests and conver-gence with grid
    • Cappello, F., Djilali, S., Fedak, G., Hérault, T., Magniette, F., Néri, V., Lodygensky, O.: Computing on large-scale distributed systems: XtremWeb architec-ture, programming models, security, tests and conver-gence with grid. Future Gener. Comput. Syst. 21(3), 417-437 (2005)
    • (2005) Future Gener. Comput. Syst , vol.21 , Issue.3 , pp. 417-437
    • Cappello, F.1    Djilali, S.2    Fedak, G.3    Hérault, T.4    Magniette, F.5    Néri, V.6    Lodygensky, O.7
  • 4
    • 56049109084 scopus 로고    scopus 로고
    • Optimizing data distribution in desktop grid platforms
    • Costa, F., Silva, L., Fedak, G., Kelley, I.: Optimizing data distribution in desktop grid platforms. Parallel Process. Lett. 18(3), 391-410 (2008)
    • (2008) Parallel Process. Lett. , vol.18 , Issue.3 , pp. 391-410
    • Costa, F.1    Silva, L.2    Fedak, G.3    Kelley, I.4
  • 5
    • 34248579323 scopus 로고    scopus 로고
    • Sabotage-tolerance and trust management in desktop grid com-puting
    • Domingues, P., Sousa, B., Silva, L.M.: Sabotage-tolerance and trust management in desktop grid com-puting. Future Gener. Comput. Syst. 23(7), 904-912 (2007)
    • (2007) Future Gener. Comput. Syst , vol.23 , Issue.7 , pp. 904-912
    • Domingues, P.1    Sousa, B.2    Silva, L.M.3
  • 6
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Lecture Notes in Computer Science, vol. 2429, Springer, New York
    • Douceur, J.R.: The sybil attack. In: Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Lecture Notes in Computer Science, vol. 2429, pp. 251-260. Springer, New York (2002)
    • (2002) Peer-to-peer Systems, First International Workshop, Iptps 2002 , pp. 251-260
    • Douceur, J.R.1
  • 13
    • 0001457509 scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • In: Cam, L.M.L., Neyman, J. (eds.), University of California Press, Berkeley
    • MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Cam, L.M.L., Neyman, J. (eds.) Proc. of the 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281-297. University of California Press, Berkeley (1967)
    • (1967) Proc. of The 5th Berkeley Symposium On Mathematical Statistics and Probability , vol.1 , pp. 281-297
    • Macqueen, J.B.1
  • 14
    • 0032306029 scopus 로고    scopus 로고
    • Byzantine quorum systems
    • Malkhi, D., Reiter, M.K.: Byzantine quorum systems. Distrib. Comput. 11(4), 203-213 (1998)
    • (1998) Distrib. Comput , vol.11 , Issue.4 , pp. 203-213
    • Malkhi, D.1    Reiter, M.K.2
  • 15
    • 0036499242 scopus 로고    scopus 로고
    • Sabotage-tolerance mechanisms for volunteer computing systems
    • Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst. 18(4), 561-572 (2002)
    • (2002) Future Gener. Comput. Syst , vol.18 , Issue.4 , pp. 561-572
    • Sarmenta, L.F.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.