메뉴 건너뛰기




Volumn , Issue , 2010, Pages 687-692

Do you get what you pay for? Using proof-of-work functions to verify performance assertions in the cloud

Author keywords

Benchmark; Cloud computing; Security; Trust

Indexed keywords

ATTACK VECTOR; BENCHMARK; CHALLENGE-RESPONSE SYSTEMS; CPU TIME; DIRECT ACCESS; PAY-PER-USE; PRICE MODELS; REFERENCE BENCHMARKS; RUNTIMES; SECURITY; TRUST; VIRTUAL MACHINES;

EID: 79952395279     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2010.100     Document Type: Conference Paper
Times cited : (12)

References (14)
  • 1
    • 79952386550 scopus 로고    scopus 로고
    • Online; accessed 9-November-2009, February [Online]. Available: http://www.donutey.com/hardwaretesting.php
    • K. Castor, "Hardware Testing and Benchmarking Methodology," Online; accessed 9-November-2009, February 2006, http://www.donutey.com/ hardwaretesting.php. [Online]. Available: http://www.donutey.com/ hardwaretesting.php
    • (2006) Hardware Testing and Benchmarking Methodology
    • Castor, K.1
  • 4
    • 79952417346 scopus 로고    scopus 로고
    • Online; accessed 19-November-2009, July [Online]. Available: http://www.tecchannel.de/server/extra/443198/supercomputer benchmarks
    • M. Bolten, "Supercomputer-benchmarks," Online; accessed 19-November-2009, July 2006, http://www.tecchannel.de/server/extra/443198/ supercomputer benchmarks/. [Online]. Available: http://www.tecchannel.de/server/ extra/443198/supercomputer benchmarks/
    • (2006) Supercomputer-benchmarks
    • Bolten, M.1
  • 6
    • 84943235829 scopus 로고
    • Pricing via Processing or Combatting Junk Mail
    • C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," Lecture Notes In Computer Science, vol. 740, pp. 139-147, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 8
    • 84861587712 scopus 로고    scopus 로고
    • Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
    • A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks," NDSS, p. 15, 1999.
    • (1999) NDSS , pp. 15
    • Juels, A.1    Brainard, J.2
  • 11
    • 26444509427 scopus 로고    scopus 로고
    • Off-line karma: A decentralized currency for peer-to-peer and grid applications
    • F. Garcia and J. Hoepman, "Off-line karma: A decentralized currency for peer-to-peer and grid applications," Lecture Notes in Computer Science, vol. 3531, pp. 364-377, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 364-377
    • Garcia, F.1    Hoepman, J.2
  • 12
    • 84979076059 scopus 로고    scopus 로고
    • PayWord and MicroMint: Two simple micropayment schemes
    • R. L. Rivest, "PayWord and MicroMint: two simple micropayment schemes," in CryptoBytes, 1996, pp. 69-87.
    • (1996) CryptoBytes , pp. 69-87
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.