Security and privacy threats to volunteer computing

Abawajy, Jemal 2008, Security and privacy threats to volunteer computing, International journal of critical infrastructures, vol. 4, no. 3, pp. 245-255, doi: 10.1504/IJCIS.2008.017439.

Attached Files
Name Description MIMEType Size Downloads

Title Security and privacy threats to volunteer computing
Author(s) Abawajy, JemalORCID iD for Abawajy, Jemal
Journal name International journal of critical infrastructures
Volume number 4
Issue number 3
Start page 245
End page 255
Total pages 11
Publisher Inderscience
Place of publication Oxford, England
Publication date 2008
ISSN 1475-3219
Keyword(s) volunteer computing
security threats
privacy threats
parallel computing
security defence
computational infrastructure
critical infrastructures
Summary The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.
Language eng
DOI 10.1504/IJCIS.2008.017439
Field of Research 080305 Multimedia Programming
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
HERDC collection year 2008
Copyright notice ©2008, Inderscience
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 939 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 13:57:35 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact