DHT-based security infrastructure for trusted internet and grid computing
Kai Hwang,
Min Cai,
Yu-Kwong Kwok,
Shanshan Song,
Yu Chen and
Ying Chen
International Journal of Critical Infrastructures, 2006, vol. 2, issue 4, 412-433
Abstract:
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.
Keywords: security infrastructure; internet computing; grid computing; intrusion detection; worm containment; DDoS defence; distributed hash table; critical infrastructures; network security. (search for similar items in EconPapers)
Date: 2006
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=11348 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijcist:v:2:y:2006:i:4:p:412-433
Access Statistics for this article
More articles in International Journal of Critical Infrastructures from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().