Resource Management Using Untrusted Auctioneers in a Grid Economy
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[3] Kyle Chard,et al. Fine Grained Resource Reservation and Management in Grid Economics , 2005, GCA.
[4] Makoto Yokoo,et al. Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.
[5] Von-Wun Soo,et al. Market-oriented multiple resource scheduling in grid computing environments , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[6] David C. Parkes,et al. An Iterative Generalized Vickrey Auction: Strategy-Proofness without Complete Revelation , 2001 .
[7] Artur Andrzejak,et al. Service-Centric Globally Distributed Computing , 2003, IEEE Internet Comput..
[8] Ian Welch,et al. Trustworthy auctions for grid-style economies , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[9] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[10] Hal R. Varian,et al. Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.
[11] Yoav Shoham,et al. Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.
[12] Ed Dawson,et al. Five Sealed-bid Auction Models , 2003, ACSW.
[13] David Abramson,et al. Economic models for resource management and scheduling in Grid computing , 2002, Concurr. Comput. Pract. Exp..
[14] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[15] Noam Nisan,et al. Computationally feasible VCG mechanisms , 2000, EC '00.
[16] T. Sandholm. Limitations of the Vickrey Auction in Computational Multiagent Systems , 1996 .
[17] Pierluigi Ritrovato,et al. An emerging architecture enabling grid based application service provision , 2003, Seventh IEEE International Enterprise Distributed Object Computing Conference, 2003. Proceedings..
[18] Lalana Kagal,et al. An infrastructure for distributed trust management , 2001 .
[19] Farid Ould-Saada,et al. Building a Production Grid in Scandinavia , 2003, IEEE Internet Comput..
[20] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[21] Kris Bubendorfer,et al. Improving resource utilisation in market oriented grid management and scheduling , 2006, ACSW.
[22] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[23] Jeffrey K. MacKie-Mason,et al. Generalized Vickrey Auctions , 1994 .
[24] Ronald M. Harstad,et al. Computationally Manageable Combinational Auctions , 1998 .
[25] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[26] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[27] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[28] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[29] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.