File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: DHT-based security infrastructure for trusted internet and grid computing

TitleDHT-based security infrastructure for trusted internet and grid computing
Authors
KeywordsDDoS defence
Grid computing
Internet computing
Intrusion detection
Security infrastructure
Worm containment
Issue Date2006
PublisherInderscience Publishers. The Journal's web site is located at http://www.inderscience.com/ijcis
Citation
International Journal Of Critical Infrastructures, 2006, v. 2 n. 4, p. 412-433 How to Cite?
AbstractWe designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet. Copyright © 2006 Inderscience Enterprises Ltd.
Persistent Identifierhttp://hdl.handle.net/10722/73560
ISSN
2015 SCImago Journal Rankings: 0.277
References

 

DC FieldValueLanguage
dc.contributor.authorHwang, Ken_HK
dc.contributor.authorCai, Men_HK
dc.contributor.authorKwok, YKen_HK
dc.contributor.authorSong, Sen_HK
dc.contributor.authorChen, Yen_HK
dc.contributor.authorChen, Yen_HK
dc.date.accessioned2010-09-06T06:52:32Z-
dc.date.available2010-09-06T06:52:32Z-
dc.date.issued2006en_HK
dc.identifier.citationInternational Journal Of Critical Infrastructures, 2006, v. 2 n. 4, p. 412-433en_HK
dc.identifier.issn1475-3219en_HK
dc.identifier.urihttp://hdl.handle.net/10722/73560-
dc.description.abstractWe designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet. Copyright © 2006 Inderscience Enterprises Ltd.en_HK
dc.languageengen_HK
dc.publisherInderscience Publishers. The Journal's web site is located at http://www.inderscience.com/ijcisen_HK
dc.relation.ispartofInternational Journal of Critical Infrastructuresen_HK
dc.rightsInternational Journal of Critical Infrastructures. Copyright © Inderscience Publishers.en_HK
dc.subjectDDoS defenceen_HK
dc.subjectGrid computingen_HK
dc.subjectInternet computingen_HK
dc.subjectIntrusion detectionen_HK
dc.subjectSecurity infrastructureen_HK
dc.subjectWorm containmenten_HK
dc.titleDHT-based security infrastructure for trusted internet and grid computingen_HK
dc.typeArticleen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1475-3219&volume=2&issue=4&spage=412&epage=433&date=2006&atitle=DHT-Based+Security+Infrastructure+for+Trusted+Internet+and+Grid+Computingen_HK
dc.identifier.emailKwok, YK:ykwok@eee.hku.hken_HK
dc.identifier.authorityKwok, YK=rp00128en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1504/IJCIS.2006.011348en_HK
dc.identifier.scopuseid_2-s2.0-33846144789en_HK
dc.identifier.hkuros126154en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-33846144789&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume2en_HK
dc.identifier.issue4en_HK
dc.identifier.spage412en_HK
dc.identifier.epage433en_HK
dc.publisher.placeUnited Kingdomen_HK
dc.identifier.scopusauthoridHwang, K=7402426691en_HK
dc.identifier.scopusauthoridCai, M=7202863417en_HK
dc.identifier.scopusauthoridKwok, YK=7101857718en_HK
dc.identifier.scopusauthoridSong, S=8875389000en_HK
dc.identifier.scopusauthoridChen, Y=7601429477en_HK
dc.identifier.scopusauthoridChen, Y=7601449172en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats