Sciweavers

40 search results - page 1 / 8
» On the Malicious Participants Problem in Computational Grid
Sort
View
GCC
2003
Springer
13 years 9 months ago
On the Malicious Participants Problem in Computational Grid
Abstract. Computational Grid allows customers to submit tasks to service providers. To maintain the availability, fairness and performance, it is critical to protect Computational ...
Wenguang Chen, Weimin Zheng, Guangwen Yang
MIDDLEWARE
2004
Springer
13 years 10 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
SPAA
2010
ACM
13 years 9 months ago
Collaborative scoring with dishonest participants
Consider a set of players that are interested in collectively evaluating a set of objects. We develop a collaborative scoring protocol in which each player evaluates a subset of t...
Seth Gilbert, Rachid Guerraoui, Faezeh Malakouti R...
ICCS
2005
Springer
13 years 10 months ago
GIVS: Integrity Validation for Grid Security
Abstract. In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence...
Giuliano Casale, Stefano Zanero
FC
2009
Springer
84views Cryptology» more  FC 2009»
13 years 8 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha