2007
DOI: 10.1016/j.future.2006.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Sabotage-tolerance and trust management in desktop grid computing

Abstract: The success of grid computing in open environments like the Internet is highly dependent on the adoption of mechanisms to detect failures and malicious sabotage attempts. It is also required to maintain a trust management system that permits one to distinguish the trustable from the non-trustable participants in a global computation. Without these mechanisms, users with data-critical applications will never rely on desktop grids, and will rather prefer to support higher costs to run their computations in close… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
46
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(46 citation statements)
references
References 14 publications
0
46
0
Order By: Relevance
“…A well known work-pool-based master-worker model [12], [16], [18]- [21] is assumed as the computation model of VC systems. This model is used in almost all VC systems practically.…”
Section: Computational Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…A well known work-pool-based master-worker model [12], [16], [18]- [21] is assumed as the computation model of VC systems. This model is used in almost all VC systems practically.…”
Section: Computational Modelmentioning
confidence: 99%
“…It was recently pointed out in [12]- [14] that verification of results is crucial for any VC system. Because VC enables anyone on the Internet to join a computation, participants are not reliable.…”
Section: Introductionmentioning
confidence: 99%
“…Several methods for colluder detection have been proposed [9]. Quiz-based methods use tasks with verifiable results [7], called 'quizzes', which are embedded into the tasks.…”
Section: Introductionmentioning
confidence: 99%
“…For the first problem (1), some sabotage-tolerance technique must be employed [15]. General VC systems employ some sort of voting, where each job is distributed to multiple workers for a majority decision [16], [17].…”
Section: Introductionmentioning
confidence: 99%