Security and privacy threats to volunteer computing

Abawajy, Jemal 2008, Security and privacy threats to volunteer computing, International journal of critical infrastructures, vol. 4, no. 3, pp. 245-255.

Attached Files
Name Description MIMEType Size Downloads

Title Security and privacy threats to volunteer computing
Author(s) Abawajy, Jemal
Journal name International journal of critical infrastructures
Volume number 4
Issue number 3
Start page 245
End page 255
Publisher Inderscience
Place of publication Oxford, England
Publication date 2008
ISSN 1475-3219
1741-8038
Keyword(s) volunteer computing
security threats
privacy threats
attacks
parallel computing
security defence
computational infrastructure
critical infrastructures
Summary The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.
Language eng
Field of Research 080305 Multimedia Programming
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
HERDC collection year 2008
Copyright notice ©2008, Inderscience
Persistent URL http://hdl.handle.net/10536/DRO/DU:30017825

Document type: Journal Article
Collection: School of Engineering and Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 379 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 13:57:35 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.