Abstract. This paper presents a new approach for certifying the cor-rectness of program executions in hostile environments, where tasks or their results have been corrupted due to benign or malicious act. Extend-ing previous results in the restricted context of independent tasks, we introduce a probabilistic certification that establishes whether the results of computations are correct. This probabilistic approach does not make any assumptions about the attack and certification errors are only due to unlucky random choices. Bounds associated with certification are pro-vided for general graphs and for tasks with out-tree dependencies found in a medical image analysis application that motivated the research.
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
AbstractThe Do-All problem is about scheduling t similar and independent tasks to be performed by p ...
Probabilistic software analysis seeks to quantify the likelihood of reaching a target event under un...
Abstract. This paper presents a new approach for certifying the cor-rectness of program executions i...
In [6], a new approach for certifying the correctness of pro-gram executions in hostile environments...
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of no...
In this paper we consider the verification and certification of computations that are done remotely....
Abstract. We introduce software integrity checking expressions (Soft-ICEs), which are program predic...
AbstractTo protect critical resources in networked environments, it is important to quantify the lik...
Result checking is the theory and practice of proving that the result of an execution of a program o...
Cyber-attack models and strategies for their mitigation have been studied recently in a deterministi...
International audienceBy exploiting idle time on volunteer machines, desktop grids provide a way to ...
AbstractTo protect critical resources in networked environments, it is important to quantify the lik...
Abstract Security and fault-tolerance is a big issue for intensive parallel computing in pervasive e...
Many software systems exhibit probabilistic behaviour, either added explicitly, to improve performan...
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
AbstractThe Do-All problem is about scheduling t similar and independent tasks to be performed by p ...
Probabilistic software analysis seeks to quantify the likelihood of reaching a target event under un...
Abstract. This paper presents a new approach for certifying the cor-rectness of program executions i...
In [6], a new approach for certifying the correctness of pro-gram executions in hostile environments...
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of no...
In this paper we consider the verification and certification of computations that are done remotely....
Abstract. We introduce software integrity checking expressions (Soft-ICEs), which are program predic...
AbstractTo protect critical resources in networked environments, it is important to quantify the lik...
Result checking is the theory and practice of proving that the result of an execution of a program o...
Cyber-attack models and strategies for their mitigation have been studied recently in a deterministi...
International audienceBy exploiting idle time on volunteer machines, desktop grids provide a way to ...
AbstractTo protect critical resources in networked environments, it is important to quantify the lik...
Abstract Security and fault-tolerance is a big issue for intensive parallel computing in pervasive e...
Many software systems exhibit probabilistic behaviour, either added explicitly, to improve performan...
Abstract. This paper introduces a line of research on secure distributed human computation. We consi...
AbstractThe Do-All problem is about scheduling t similar and independent tasks to be performed by p ...
Probabilistic software analysis seeks to quantify the likelihood of reaching a target event under un...