Reputation-based Majority Voting for Malicious Grid Resources Tolerance
暂无分享,去创建一个
Mohammed Essaaidi | Ahmed El Moussaoui | Ahmed Bendahmane | Ali Younes | A. E. Moussaoui | M. Essaaidi | A. Bendahmane | A. Younes
[1] Muthucumaru Maheswaran,et al. Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.
[2] Proceedings 12th IEEE International Symposium on High Performance Distributed Computing , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.
[3] Fabio Kon,et al. InteGrade: object‐oriented Grid middleware leveraging the idle computing power of desktop machines , 2004, Concurr. Pract. Exp..
[4] David P. Anderson,et al. BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.
[5] Rajkumar Buyya,et al. GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids , 2004, PDCAT.
[6] Paul Resnick,et al. Reputation systems , 2000, CACM.
[7] A. Bendahmane,et al. Grid computing security mechanisms: State-of-the-art , 2009, 2009 International Conference on Multimedia Computing and Systems.
[8] Carsten Franke,et al. Virtual Organization Management in XtreemOS: an Overview , 2007, CoreGRID.
[9] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[10] Francisco Vilar Brasileiro,et al. Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids , 2009, 2009 Fourth Latin-American Symposium on Dependable Computing.
[11] Fabian Monrose,et al. Distributed Execution with Remote Audit , 1999, NDSS.
[12] Hector Garcia-Molina,et al. EigenRep: Reputation Management in P2P Networks , 2003 .
[13] Leon Gommans,et al. Web services and grid security vulnerabilities and threats analysis and model , 2005, The 6th IEEE/ACM International Workshop on Grid Computing, 2005..
[14] Muthucumaru Maheswaran,et al. Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[15] Ian T. Foster,et al. A secure communications infrastructure for high-performance distributed computing , 1997, Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183).
[16] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[17] Francine Berman,et al. Overview of the Book: Grid Computing – Making the Global Infrastructure a Reality , 2003 .
[18] Chris GauthierDickey,et al. Result verification and trust-based scheduling in peer-to-peer grids , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[19] Mohammed Essaaidi,et al. Compromised Resources Tolerance in Grid Computing Systems , 2010, IDC.
[20] Bruno Sousa,et al. Sabotage-tolerance and trust management in desktop grid computing , 2007, Future Gener. Comput. Syst..
[21] Luis F. G. Sarmenta,et al. Sabotage-tolerance mechanisms for volunteer computing systems , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[22] Diego Gambetta,et al. People's Trust: The Design of a Survey-Based Experiment , 2006, SSRN Electronic Journal.
[23] Bernd Freisleben,et al. Managing Behaviour Trust in Grid Computing Environments , 2008 .
[24] Gilles Fedak,et al. Characterizing Result Errors in Internet Desktop Grids , 2007, Euro-Par.
[25] C. Chen,et al. An approach for resource selection and allocation in grid based on trust management system , 2009, 2009 First International Conference on Future Information Networks.
[26] V. Vijayakumar,et al. Trust and Reputation Aware Security for Resource Selection in Grid Computing , 2008, 2008 International Conference on Security Technology.