Reputation management in collaborative computing systems

AE Arenas, B Aziz, GC Silaghi - Security and Communication …, 2010 - Wiley Online Library
In collaborative systems, a set of organizations shares their computing resources, such as
compute cycles, storage space or on‐line services, in order to establish Virtual …

Optimal spot-checking for collusion tolerance in computer grids

G Levitin, L Xing, Y Dai - IEEE Transactions on Dependable …, 2017 - ieeexplore.ieee.org
Many grid-computing systems adopt voting-based techniques to resist sabotage. However,
these techniques become ineffective in grid systems subject to collusion behavior, where …

Optimizing the data distribution layer of boinc with bittorrent

F Costa, L Silva, G Fedak… - 2008 IEEE international …, 2008 - ieeexplore.ieee.org
In this paper we show how we applied BitTorrent data distribution techniques to the BOINC
middleware. Our goal was to decentralize BOINC's data model to take advantage of client …

Peer-to-peer techniques for data distribution in desktop grid computing platforms

M Danelutto, P Fragopoulou, V Getov, F Costa… - Making Grids Work …, 2008 - Springer
In this paper, we discuss how Peer-to-Peer data distribution techniques can be adapted to
Desktop Grid computing environments, particularly to the BOINC platform. To date, Desktop …

[PDF][PDF] A case study on hybrid cloud approach to automate the cloud services based on decision support system

DG Bhatta - 2021 - glccollege.digitallibrary.co.in
Cloud computing (CC) provides substantial technological benefits and allows businesses,
particularly small and medium-sized businesses (SMEs), to save upfront capital investments …

[PDF][PDF] Grid architectural issues: State-of-the-art and future trends

A Andrzejak, A Reinefeld, F Schintke, T Schtt… - CoreGRID White …, 2008 - academia.edu
Grid architecture is one of the cornerstones for successful development and proliferation of
Grid computing. The scale, dynamism and openness of the Grid, together with demands on …

An emulation environment for vulnerability analysis of large-scale distributed system

G Zhao, X Kuang, W Zheng - 2009 Eighth International …, 2009 - ieeexplore.ieee.org
Because of wide area deployment, heterogeneity, dynamism, and other characteristics of
large-scale distributed system (LDS), experimental environment supporting dynamic …

PCF programming model and FORTRAN bindings

B Leasure - Proceedings of the Thirteenth Annual International …, 1989 - computer.org
Because of wide area deployment, heterogeneity, dynamism, and other characteristics of
large-scale distributed system (LDS), experimental environment supporting dynamic …

Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid

A Bendahmane, M Essaaidi - Journal of Cyber …, 2020 - journals.riverpublishers.com
Smart grid is a system in which it is possible to use voting-based techniques to resist
sabotage of several cyber-attacks. The adaptation of these techniques can be difficult and …

[PDF][PDF] Habilitation Thesis

GC SILAGHI - cnatdcu.ro
Peer-to-Peer systems represent one of the most dynamic and challenging research area of
distributed computing. With theoretical grounds on multi-agent systems, P2P systems get …