About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Workshop on the Value of Security through Collaboration

Research Article

Scalable discovery of private resources

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550310,
        author={Spyros Kotoulas and Ronny Siebes},
        title={Scalable discovery of private resources},
        proceedings={3rd International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2008},
        month={6},
        keywords={Application software  Computer architecture  Computer science  Costs  Multiagent systems  Peer to peer computing  Privacy  Protocols  Scalability  Vehicle dynamics},
        doi={10.1109/SECCOM.2007.4550310}
    }
    
  • Spyros Kotoulas
    Ronny Siebes
    Year: 2008
    Scalable discovery of private resources
    SECOVAL
    IEEE
    DOI: 10.1109/SECCOM.2007.4550310
Spyros Kotoulas1,*, Ronny Siebes1,*
  • 1: Vrije Universiteit Amsterdam Department of Computer Science De Boelelaan 1081, 1081HV, Amsterdam
*Contact email: kot@few.vu.nl, ronny@few.vu.nl

Abstract

Resource discovery is fundamental to a multitude of distributed systems, including grids, web-based applications and multi-agent systems. To achieve scalability at a low cost, many researchers have turned to a peer-to-peer paradigm, leading to the development of a multitude of protocols and algorithms being developed, with implementations still lagging behind. In this paper we consider the privacy implications of peer-to-peer discovery systems and propose a framework for discovery of private resources. Furthermore, we propose and evaluate an architecture and a series of methods using distributed hash tables. Finally, we provide an implementation in the context of the OpenKnowledge project.

Keywords
Application software Computer architecture Computer science Costs Multiagent systems Peer to peer computing Privacy Protocols Scalability Vehicle dynamics
Published
2008-06-24
Publisher
IEEE
Modified
2011-08-03
http://dx.doi.org/10.1109/SECCOM.2007.4550310
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL