BOINC: A System for Public-Resource Computing and Storage, Fifth IEEE/ACM International Workshop on Grid Computing, pp.4-10, 2004. ,
DOI : 10.1109/GRID.2004.14
URL : http://boinc.berkeley.edu/grid_paper_04.pdf
SETI@home: an experiment in public-resource computing, Communications of the ACM, vol.45, issue.11, pp.56-61, 2002. ,
DOI : 10.1145/581571.581573
Cost-benefit analysis of Cloud Computing versus desktop grids, 2009 IEEE International Symposium on Parallel & Distributed Processing, pp.1-12, 2009. ,
DOI : 10.1109/IPDPS.2009.5160911
URL : https://hal.archives-ouvertes.fr/hal-00788911
Result verification and trust-based scheduling in peer-to-peer grids, " in Peer-to-Peer Computing, pp.31-38, 2005. ,
Adaptive Reputation-Based Scheduling on Unreliable Distributed Infrastructures, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.11, pp.1551-1564, 2007. ,
DOI : 10.1109/TPDS.2007.1094
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.4431
A dynamic approach for characterizing collusion in desktop grids, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS), 2010. ,
DOI : 10.1109/IPDPS.2010.5470422
URL : https://hal.archives-ouvertes.fr/inria-00441256
The Sybil Attack, Lecture Notes in Computer Science, vol.2429, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
On the adaptive real-time detection of fast-propagating network worms, Journal in Computer Virology, vol.35, issue.4, pp.197-210, 2008. ,
DOI : 10.1007/s11416-007-0080-y
Reliably Executing Tasks in the Presence of Untrusted Entities, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), 2006. ,
DOI : 10.1109/SRDS.2006.40
Sabotage-tolerance mechanisms for volunteer computing systems, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid, pp.561-572, 2002. ,
DOI : 10.1109/CCGRID.2001.923211
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.3884
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
An algebra for assessing trust in certification chains, NDSS. The Internet Society, 1999. ,
Sabotage-tolerance and trust management in desktop grid computing, Future Generation Computer Systems, vol.23, issue.7, pp.904-912, 2007. ,
DOI : 10.1016/j.future.2006.12.001
URL : http://hdl.handle.net/10316/4095
On the cost-ineffectiveness of redundancy in commercial P2P computing, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.280-288, 2005. ,
DOI : 10.1145/1102120.1102157
Collusion Detection for Grid Computing, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, pp.412-419, 2009. ,
DOI : 10.1109/CCGRID.2009.12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.9709
A Probabilistic Approach for Task and Result Certification of Large-Scale Distributed Applications in Hostile Environments, EGC, ser. Lecture Notes in Computer Science, pp.323-333, 2005. ,
DOI : 10.1007/11508380_34
Defeating Colluding Nodes in Desktop Grid Computing Platforms, Parallel and Distributed Processing (IPDPS), pp.1-8, 2008. ,
A Scheduling Algorithm for Defeating Collusion, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00524493
The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.398-407, 2010. ,
DOI : 10.1109/CCGRID.2010.71
URL : https://hal.archives-ouvertes.fr/inria-00433523