Market‐Oriented Grid and Utility Computing 2009
DOI: 10.1002/9780470455432.ch24
|View full text |Cite
|
Sign up to set email alerts
|

Trust in Grid Resource Auctions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…There are three key requirements for holding trustworthy resource auctions in a federated environment [128]:…”
Section: Secure Auction Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…There are three key requirements for holding trustworthy resource auctions in a federated environment [128]:…”
Section: Secure Auction Protocolsmentioning
confidence: 99%
“…Verification techniques are not a focus of this thesis. Various techniques have been explored in the literature to facilitate public verification without revealing additional information [128,129,130,131]. The remainder of this thesis focuses on secure protocols used to provide bid privacy and distribute trust over a group of auctioneers.…”
Section: Secure Auction Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are three key requirements for holding trustworthy resource auctions in a federated environment [128]:…”
Section: Secure Auction Protocolsmentioning
confidence: 99%
“…Verification techniques are not a focus of this thesis. Various techniques have been explored in the literature to facilitate public verification without revealing additional information [128,129,130,131]. The remainder of this thesis focuses on secure protocols used to provide bid privacy and distribute trust over a group of auctioneers.…”
Section: Secure Auction Protocolsmentioning
confidence: 99%