File(s) under permanent embargo
Security and privacy threats to volunteer computing
The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.
History
Journal
International journal of critical infrastructuresVolume
4Issue
3Pagination
245 - 255Publisher
InderscienceLocation
Oxford, EnglandPublisher DOI
ISSN
1475-3219eISSN
1741-8038Language
engPublication classification
C1 Refereed article in a scholarly journalCopyright notice
2008, InderscienceUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC