File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1504/IJCIS.2006.011348
- Scopus: eid_2-s2.0-33846144789
- WOS: WOS:000216602600007
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: DHT-based security infrastructure for trusted internet and grid computing
Title | DHT-based security infrastructure for trusted internet and grid computing |
---|---|
Authors | |
Keywords | DDoS defence Grid computing Internet computing Intrusion detection Security infrastructure Worm containment |
Issue Date | 2006 |
Publisher | Inderscience Publishers. The Journal's web site is located at http://www.inderscience.com/ijcis |
Citation | International Journal Of Critical Infrastructures, 2006, v. 2 n. 4, p. 412-433 How to Cite? |
Abstract | We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet. Copyright © 2006 Inderscience Enterprises Ltd. |
Persistent Identifier | http://hdl.handle.net/10722/73560 |
ISSN | 2023 Impact Factor: 0.5 2023 SCImago Journal Rankings: 0.211 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, K | en_HK |
dc.contributor.author | Cai, M | en_HK |
dc.contributor.author | Kwok, YK | en_HK |
dc.contributor.author | Song, S | en_HK |
dc.contributor.author | Chen, Y | en_HK |
dc.contributor.author | Chen, Y | en_HK |
dc.date.accessioned | 2010-09-06T06:52:32Z | - |
dc.date.available | 2010-09-06T06:52:32Z | - |
dc.date.issued | 2006 | en_HK |
dc.identifier.citation | International Journal Of Critical Infrastructures, 2006, v. 2 n. 4, p. 412-433 | en_HK |
dc.identifier.issn | 1475-3219 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/73560 | - |
dc.description.abstract | We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet. Copyright © 2006 Inderscience Enterprises Ltd. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Inderscience Publishers. The Journal's web site is located at http://www.inderscience.com/ijcis | en_HK |
dc.relation.ispartof | International Journal of Critical Infrastructures | en_HK |
dc.rights | International Journal of Critical Infrastructures. Copyright © Inderscience Publishers. | en_HK |
dc.subject | DDoS defence | en_HK |
dc.subject | Grid computing | en_HK |
dc.subject | Internet computing | en_HK |
dc.subject | Intrusion detection | en_HK |
dc.subject | Security infrastructure | en_HK |
dc.subject | Worm containment | en_HK |
dc.title | DHT-based security infrastructure for trusted internet and grid computing | en_HK |
dc.type | Article | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1475-3219&volume=2&issue=4&spage=412&epage=433&date=2006&atitle=DHT-Based+Security+Infrastructure+for+Trusted+Internet+and+Grid+Computing | en_HK |
dc.identifier.email | Kwok, YK:ykwok@eee.hku.hk | en_HK |
dc.identifier.authority | Kwok, YK=rp00128 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1504/IJCIS.2006.011348 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33846144789 | en_HK |
dc.identifier.hkuros | 126154 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33846144789&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 2 | en_HK |
dc.identifier.issue | 4 | en_HK |
dc.identifier.spage | 412 | en_HK |
dc.identifier.epage | 433 | en_HK |
dc.identifier.isi | WOS:000216602600007 | - |
dc.publisher.place | United Kingdom | en_HK |
dc.identifier.scopusauthorid | Hwang, K=7402426691 | en_HK |
dc.identifier.scopusauthorid | Cai, M=7202863417 | en_HK |
dc.identifier.scopusauthorid | Kwok, YK=7101857718 | en_HK |
dc.identifier.scopusauthorid | Song, S=8875389000 | en_HK |
dc.identifier.scopusauthorid | Chen, Y=7601429477 | en_HK |
dc.identifier.scopusauthorid | Chen, Y=7601449172 | en_HK |
dc.identifier.issnl | 1475-3219 | - |