Monitoring Security and Dependability in Mobile P2P Systems
暂无分享,去创建一个
[1] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[2] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[3] Ling Liu,et al. PeerCQ: a decentralized and self-configuring peer-to-peer information monitoring system , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[4] Marcelo d'Amorim,et al. Event-based runtime verification of java programs , 2005, WODA '05.
[5] Marco Pistore,et al. Assumption-Based Composition and Monitoring of Web Services , 2007, Test and Analysis of Web Services.
[6] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[7] David S. Rosenblum,et al. Achieving scalability and expressiveness in an Internet-scale event notification service , 2000, PODC '00.
[8] Kian-Lee Tan,et al. Securing your data in agent-based P2P systems , 2003, Eighth International Conference on Database Systems for Advanced Applications, 2003. (DASFAA 2003). Proceedings..
[9] Gerald Kunzmann,et al. A scalable algorithm to monitor chord-based P2P systems at runtime , 2006, IPDPS.
[10] George Spanoudakis,et al. Non-Intrusive Monitoring of Service-Based Systems , 2006, Int. J. Cooperative Inf. Syst..
[11] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[12] Murray Shanahan,et al. The Event Calculus Explained , 1999, Artificial Intelligence Today.
[13] Jeong Hyun Yi,et al. Admission control in Peer-to-Peer: design and performance evaluation , 2003, SASN '03.
[14] Koushik Sen,et al. Rule-Based Runtime Verification , 2004, VMCAI.
[15] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[16] Carlo Ghezzi,et al. Run-Time Monitoring in Service-Oriented Architectures , 2007, Test and Analysis of Web Services.
[17] George Spanoudakis,et al. Monitoring WS-Agreement s: An Event Calculus-Based Approach , 2007, Test and Analysis of Web Services.
[18] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[19] Grigore Rosu,et al. Mop: an efficient and generic runtime verification framework , 2007, OOPSLA.
[20] Mark Brörkens,et al. JASSDA TRACE ASSERTIONS ∗ Runtime Checking the Dynamic of Java Programs , 2002 .
[21] Mark Brörkens,et al. Dynamic Event Generation for Runtime Checking using the JDI , 2002, Electron. Notes Theor. Comput. Sci..
[22] Mahesh Viswanathan,et al. Java-MaC: a Run-time Assurance Tool for Java Programs , 2001, RV@CAV.
[23] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[24] Grigore Rosu,et al. An Overview of the Runtime Verification Tool Java PathExplorer , 2004, Formal Methods Syst. Des..