Search
Protect Act
research
forensics

PUBLICATIONS

The following is a list of publications related to the research projects of the lab. Click on a paper's keywords to see other papers with matching keywords.

Click here to go back to seeing all lab publications.


  • @inproceedings{Yurkewych:2005,
    Abstract = {We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated for work). We study the cost of implementing redundant task allocation (redundancy, for short) as a means of preventing cheating. Under the assumption that clients are motivated solely by the desire to maximize expected profit, we prove that, within this framework, redundancy is cost effective only when collusion among clients, including the Sybil attack, can be prevented. We show that in situations where this condition cannot be met, non-redundant task allocation is much less costly than redundancy.},
    Author = {Yurkewych, Matthew and Levine, Brian Neil and Rosenberg, Arnold L.},
    Booktitle = {Proc. ACM Conference on Computer and Communications Security (CCS)},
    Keywords = {security; peer-to-peer; Sybil attack; Synthesis project},
    Month = {November},
    Pages = {280--288},
    Sponsors = {NSF-0133055},
    Title = {{On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing}},
    Url = {http://forensics.umass.edu/pubs/yurkewych.ccs.2005.pdf},
    Year = {2005},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/yurkewych.ccs.2005.pdf}}

    [link][PDF]

  • Top Back to top

    HOME | PUBLICATIONS | RESEARCH | SPONSORS | IN THE NEWS | CONTACT