CISUC

Sabotage Tolerance and Trust Management in Desktop Grid Computing

Authors



Conference

2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, January 2006


Cited by

Year 2013 : 1 citations

 TALAL H. NOOR , QUAN Z. SHENG, SHERALI ZEADALLY, IAN YU, "Trust Management of Services in Cloud Environments: Obstacles and Solutions", ACM Computing Surveys, Vol. 0, No. 0, 2013, Pages 1, 2013

Year 2010 : 20 citations

 K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010.

 K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010.

 F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871

 K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010.

 Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010.

 F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010.

 Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010.

 Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326.

 Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010.

 Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010.

 Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010.

 Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010.

 Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010.

 Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010

 Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010

 Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010

 Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010

 Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010.

 Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010.

 Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669)