EconPapers    
Economics at your fingertips  
 

DHT-based security infrastructure for trusted internet and grid computing

Kai Hwang, Min Cai, Yu-Kwong Kwok, Shanshan Song, Yu Chen and Ying Chen

International Journal of Critical Infrastructures, 2006, vol. 2, issue 4, 412-433

Abstract: We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.

Keywords: security infrastructure; internet computing; grid computing; intrusion detection; worm containment; DDoS defence; distributed hash table; critical infrastructures; network security. (search for similar items in EconPapers)
Date: 2006
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=11348 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijcist:v:2:y:2006:i:4:p:412-433

Access Statistics for this article

More articles in International Journal of Critical Infrastructures from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijcist:v:2:y:2006:i:4:p:412-433