We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet. Copyright © 2006 Inderscience Enterprises Ltd.link_to_subscribed_fulltex
The Trusted Computing (TC) initiative developed by Trusted Computing Group (TCG) takes a distributed...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
We designed a distributed security infrastructure with self-defence capabilities to secure networked...
The USC GridSec project develops distributed security infrastructure and self-defense capabilities t...
Abstract: The USC GridSec project develops distributed security infrastructure and self-defense capa...
The security of Grid sites can be enhanced by upgrading its intrusion defense capabilities against i...
Trusted Grid computing demands robust resource allocation with security assurance at all resource si...
Recently a number of highly publicised incidents of Distributed Denial of Service (DDoS) attacks hav...
scalability analysis, trust models Trusted Grid computing demands robust resource allocation with se...
Large-scale worm outbreaks that lead to distributed denial-of-service attacks pose a major threat to...
Security has become a global problem in any field. Everyday millions of cyber crimes are being recor...
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user...
Security has become a global problem in any field. Everyday millions of cyber crimes are being recor...
The security of Grid-systems assumes the consistency, accessibility and confidentiality of system an...
The Trusted Computing (TC) initiative developed by Trusted Computing Group (TCG) takes a distributed...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
We designed a distributed security infrastructure with self-defence capabilities to secure networked...
The USC GridSec project develops distributed security infrastructure and self-defense capabilities t...
Abstract: The USC GridSec project develops distributed security infrastructure and self-defense capa...
The security of Grid sites can be enhanced by upgrading its intrusion defense capabilities against i...
Trusted Grid computing demands robust resource allocation with security assurance at all resource si...
Recently a number of highly publicised incidents of Distributed Denial of Service (DDoS) attacks hav...
scalability analysis, trust models Trusted Grid computing demands robust resource allocation with se...
Large-scale worm outbreaks that lead to distributed denial-of-service attacks pose a major threat to...
Security has become a global problem in any field. Everyday millions of cyber crimes are being recor...
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user...
Security has become a global problem in any field. Everyday millions of cyber crimes are being recor...
The security of Grid-systems assumes the consistency, accessibility and confidentiality of system an...
The Trusted Computing (TC) initiative developed by Trusted Computing Group (TCG) takes a distributed...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made avail...