Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

DHT-based security infrastructure for trusted internet and grid computing

DHT-based security infrastructure for trusted internet and grid computing We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Critical Infrastructures Inderscience Publishers

DHT-based security infrastructure for trusted internet and grid computing

Loading next page...
 
/lp/inderscience-publishers/dht-based-security-infrastructure-for-trusted-internet-and-grid-Ap0vBhQjtU
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd. All rights reserved
ISSN
1475-3219
eISSN
1741-8038
Publisher site
See Article on Publisher Site

Abstract

We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.

Journal

International Journal of Critical InfrastructuresInderscience Publishers

Published: Jan 1, 2006

There are no references for this article.