liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
BETA
Caronni, Germano
Publications (10 of 12) Show all publications
Duma, C., Karresand, M., Shahmehri, N. & Caronni, G. (2006). A Trust-Aware, P2P-Based Overlay for Intrusion Detection. In: International Workshop on Database and Expert Systems Applications DEXA06,2006: . Paper presented at International Workshop on Database and Expert Systems Applications DEXA06,2006 (pp. 692). IEEE
Open this publication in new window or tab >>A Trust-Aware, P2P-Based Overlay for Intrusion Detection
2006 (English)In: International Workshop on Database and Expert Systems Applications DEXA06,2006, IEEE , 2006, p. 692-Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2006
Keywords
intrusion detection, trust, peer-to-peer, security
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-34399 (URN)10.1109/DEXA.2006.21 (DOI)21408 (Local ID)21408 (Archive number)21408 (OAI)
Conference
International Workshop on Database and Expert Systems Applications DEXA06,2006
Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2018-01-13
Caronni, G., Gupta, A., Markson, T. R., Kumar, S., Schuba, C. & Scott, G. C. (2005). Channel-Specific File System Views in a Private Network Using a Public Network Infrastructure. U.S. Patent 6,938,169.
Open this publication in new window or tab >>Channel-Specific File System Views in a Private Network Using a Public Network Infrastructure
Show others...
2005 (English)Patent (Other (popular science, discussion, etc.))
Keywords
overlay networks, file system views
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-32519 (URN)18427 (Local ID)18427 (Archive number)18427 (OAI)
Patent
U.S. Patent 6,938,169 (2005-08-30)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Duma, C., Shahmehri, N. & Caronni, G. (2005). Dynamic trust metrics for peer-to-peer systems. In: Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications, 2005. Paper presented at Sixteenth International Workshop on Database and Expert Systems Applications, 22-26 August, 2005, Copenhagen, Denmark (pp. 776-781). Los Alamitos, CA, USA: IEEE Computer Society
Open this publication in new window or tab >>Dynamic trust metrics for peer-to-peer systems
2005 (English)In: Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications, 2005, Los Alamitos, CA, USA: IEEE Computer Society, 2005, p. 776-781Conference paper, Published paper (Refereed)
Abstract [en]

One of the fundamental challenges for peer-to-peer (P2P) systems is the ability to manage risks involved in interacting and collaborating with priorly unknown and potentially malicious parties. Reputation-based trust management can mitigate this risk by deriving the trustworthiness of a certain peer from that peer's behavior history. However, the existing reputation systems do not provide an adequate reaction to quick changes in peers' behavior, raising serious concerns regarding their effectiveness in coping with dynamic malicious peers.

In this paper we investigate the requirements on the dynamics of trust in P2P systems and propose a versatile trust metric which satisfies these requirements. In particular, our proposed metric is able to detect and penalize both the sudden changes in peers' behavior and their potential oscillatory malicious behavior. Moreover, our metric is flexible and allows the implementation of different types of trust dynamics. We evaluate our metric through simulation and show its unique features and advantages over the existing metrics.

Place, publisher, year, edition, pages
Los Alamitos, CA, USA: IEEE Computer Society, 2005
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-30649 (URN)16244 (Local ID)0-7695-2424-9 (ISBN)16244 (Archive number)16244 (OAI)
Conference
Sixteenth International Workshop on Database and Expert Systems Applications, 22-26 August, 2005, Copenhagen, Denmark
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Caronni, G., Gupta, A., Kumar, S., Markson, T. R., Schuba, C. & Scott, G. (2005). Method and system for facilitating relocation of devices on a network. U.S. Patent 6,977,929.
Open this publication in new window or tab >>Method and system for facilitating relocation of devices on a network
Show others...
2005 (English)Patent (Other (popular science, discussion, etc.))
Keywords
Overlay networks, transparent device relocation
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-32516 (URN)18424 (Local ID)18424 (Archive number)18424 (OAI)
Patent
U.S. Patent 6,977,929 (2005-12-21)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Caronni, G., Weiler, N., Waldvogel, M. & Shahmehri, N. (Eds.). (2005). Proceedings of the Fifth International Conference on Peer-to-Peer Computing. IEEE Computer Society
Open this publication in new window or tab >>Proceedings of the Fifth International Conference on Peer-to-Peer Computing
2005 (English)Collection (editor) (Other academic)
Place, publisher, year, edition, pages
IEEE Computer Society, 2005
National Category
Engineering and Technology
Identifiers
urn:nbn:se:liu:diva-59972 (URN)0-7695-2376-5 (ISBN)
Available from: 2010-10-01 Created: 2010-10-01 Last updated: 2013-10-17Bibliographically approved
Caronni, G., Gupta, A., Kumar, S., Markson, T. R., Schuba, C. & Scott, G. C. (2005). System and method for separating addresses from the delivery scheme in a virtual private network. U.S. Patent 6,970,941.
Open this publication in new window or tab >>System and method for separating addresses from the delivery scheme in a virtual private network
Show others...
2005 (English)Patent (Other (popular science, discussion, etc.))
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-32517 (URN)18425 (Local ID)18425 (Archive number)18425 (OAI)
Patent
U.S. Patent 6,970,941 (2005-11-29)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Caronni, G., Gupta, A., Markson, T. R., Kumar, S., Schuba, C. & Scott, G. C. (2005). Using multicast to provide ethernet-like communication behavior to selected peers on a network. U.S. Patent 6,870,842.
Open this publication in new window or tab >>Using multicast to provide ethernet-like communication behavior to selected peers on a network
Show others...
2005 (English)Patent (Other (popular science, discussion, etc.))
Keywords
overlay networks, multicast, ethernet emulation
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-32520 (URN)18428 (Local ID)18428 (Archive number)18428 (OAI)
Patent
U.S. Patent 6,870,842 (2005-03-22)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Caronni, G., Weiler, N. & Shahmehri, N. (Eds.). (2004). Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing. IEEE Computer Society
Open this publication in new window or tab >>Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing
2004 (English)Conference proceedings (editor) (Other academic)
Place, publisher, year, edition, pages
IEEE Computer Society, 2004
Keywords
peer-to-peer, security, networks, communication
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-22527 (URN)1788 (Local ID)0-7695-2156-8 (ISBN)1788 (Archive number)1788 (OAI)
Available from: 2009-10-07 Created: 2009-10-07 Last updated: 2018-01-13
Caronni, G., Gupta, A., Kumar, S., Markson, T. R., Schuba, C. & Scott, G. C. (2004). Truly anonymous communications using supernets, with the provision of topology hiding. U.S. Patent 6,798,782.
Open this publication in new window or tab >>Truly anonymous communications using supernets, with the provision of topology hiding
Show others...
2004 (English)Patent (Other (popular science, discussion, etc.))
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-28916 (URN)14119 (Local ID)14119 (Archive number)14119 (OAI)
Patent
U.S. Patent 6,798,782 (2004-09-28)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Turcan, E., Shahmehri, N. & Caronni, G. (2004). Usability and Security for DRM Architectures. In: e-Smart Conference and Demos,2004.
Open this publication in new window or tab >>Usability and Security for DRM Architectures
2004 (English)In: e-Smart Conference and Demos,2004, 2004Conference paper, Published paper (Refereed)
Keywords
DRM, rights management, security
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-22771 (URN)2099 (Local ID)2099 (Archive number)2099 (OAI)
Available from: 2009-10-07 Created: 2009-10-07 Last updated: 2018-01-13
Organisations

Search in DiVA

Show all publications