A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
[BUCH][B] Principles of distributed database systems
MT Özsu, P Valduriez - 1999 - Springer
The first edition of this book appeared in 1991 when the technology was new and there were
not too many products. In the Preface to the first edition, we had quoted Michael Stonebraker …
not too many products. In the Preface to the first edition, we had quoted Michael Stonebraker …
[BUCH][B] Distributed and cloud computing: from parallel processing to the internet of things
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers
complete coverage of modern distributed computing technology including clusters, the grid …
complete coverage of modern distributed computing technology including clusters, the grid …
[HTML][HTML] Handling churn in a DHT
This paper addresses the problem of churn--the continuous process of node arrival and
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …
Mercury: supporting scalable multi-attribute range queries
AR Bharambe, M Agrawal, S Seshan - Proceedings of the 2004 …, 2004 - dl.acm.org
This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute
range-based searches. Mercury differs from previous range-based query systems in that it …
range-based searches. Mercury differs from previous range-based query systems in that it …
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is
to organize existing ideas and work to facilitate system design. We present a taxonomy of …
to organize existing ideas and work to facilitate system design. We present a taxonomy of …
Eclipse attacks on overlay networks: Threats and defenses
A Singh, TW Ngan, P Druschel, DS Wallach - 2006 - pure.mpg.de
Overlay networks are widely used to deploy functionality at edge nodes without changing
network routers. Each node in an overlay network maintains connections with a number of …
network routers. Each node in an overlay network maintains connections with a number of …
Survey on agile and lean usage in finnish software industry
Earlier empirical studies have demonstrated the interest that agile methods have generated
in the software industry. Currently, lean approaches are increasingly adopted for …
in the software industry. Currently, lean approaches are increasingly adopted for …
[PDF][PDF] {BotGrep}: Finding {P2P} Bots with Structured Graph Analysis
A key feature that distinguishes modern botnets from earlier counterparts is their increasing
use of structured overlay topologies. This lets them carry out sophisticated coordinated …
use of structured overlay topologies. This lets them carry out sophisticated coordinated …
A survey on DHT-based routing for large-scale mobile ad hoc networks
Mobile ad hoc networks (MANETs) are infrastructureless and distributed communication
systems that require sophisticated approaches to routing to cope with node mobility and …
systems that require sophisticated approaches to routing to cope with node mobility and …