@article {11154994420140101, title = {MALICIOUS WORKERS TOLERANCE IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM.}, journal = {IADIS International Journal on Computer Science \& Information Systems}, volume = {9}, number = {1}, year = {2014}, pages = {55 - 70}, abstract = {The Agent in Grid (AiG) project aims to develop an agent-based infrastructure that facilitates the resource management in the Grid. The core assumptions behind the system are: software agents representing Grid resources work in teams, and all information is ontologically represented and semantically processed. Thus far, trust management in AiG system is approached from the perspective of breaching an agreement between Users and teams or contracts between teams and Workers. Unfortunately, it is also possible that some Workers, which fulfilled the agreement, could have maliciously returned incorrect results from the jobs that they executed. In this paper, we discuss how the trust management in the AiG project can be improved by using a reputation-based voting technique, in order to assure reliable job execution. [ABSTRACT FROM AUTHOR]}, keywords = {agent system, Computational grids (Computer systems), Distributed computing, Grid computing, Inte lligent agents (Computer software), Job performance, majority voting, malicious workers tolerance, reputation, Teams in the workplace, trust management}, issn = {16463692}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=111549944\&site=ehost-live}, author = {Attaoui, Naoual and Bendahmane, Ahmed and Essaaidi, Mohammad and Sanyal, Sugata and Ganzha, Maria and Paprzycki, Marcin and Wasielewska, Katarzyna} } @article {5938723720101201, title = {REPUTATION-BASED MAJORITY VOTING FOR MALICIOUS GRID RESOURCES TOLERANCE.}, journal = {Scalable Computing: Practice \& Experience}, volume = {11}, number = {4}, year = {2010}, pages = {385 - 392}, abstract = {Recently, distributed computing infrastructures such as grid computing, have witnessed huge developments which have a very important impact on computationally intensive scientific, industrial and engineering problems. Collaborative computing, resources access and sharing facilitated by grid computing systems amplifies concerns about cyber attacks and misbehaviors of grid resources (resources provider). In many cases, an organization may send out jobs for remote execution on untrustworthy machines. Since resource sharing and cooperation among different administrative domains are among the central goals of grid computing, it is necessary to guarantee that, among the shared resources, there are no malicious resources interested in invalidating or corrupting the job results. In order to guarantee reliable jobs execution in grid systems, we have developed a new approach for malicious grid resources tolerance using reputation to improve the efficiency of majority voting mechanisms. The grid}, keywords = {Computational grids (Computer systems), Distributed computing, Grid computing, Internet service providers, majority voting, malicious resources, Plurality voting, reputation, Service level agreements, tolerance, Web services}, issn = {18951767}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=59387237\&site=ehost-live}, author = {Bendahmane, Ahmed and Essaaidi, Mohammad and El Moussaoui, Ahmed and Younes, Ali} }