Shanshan Song

Learn More
Internet commerce and online commodity exchanges suffer from distrust among sellers and buyers, who are often strangers to each other. The authors present a new P2P reputation system based on fuzzy logic inferences, which can better handle uncertainty, fuzziness, and incomplete information in peer trust reports. This system aggregates peer reputations with(More)
In scheduling a large number of user jobs for parallel execution on an open-resource Grid system, the jobs are subject to system failures or delays caused by infected hardware, software vulnerability, and distrusted security policy. This paper models the risk and insecure conditions in Grid job scheduling. Three risk-resilient strategies, preemptive,(More)
In this paper, our contributions are two-fold: first, we enhance the Min-Min and Sufferage heuristics under three risk modes driven by security concerns. Second, we propose a new space-time genetic algorithm (STGA) for trusted job scheduling, which is very fast and easy to implement. Under our new model, a job can possibly fail if the site security level is(More)
Trusted Grid computing demands robust resource allocation with security assurance at all resource sites. Large-scale Grid applications are being hindered by lack of security assurance from remote resource sites. We developed a security-binding scheme through site reputation assessment and trust integration across Grid sites. We do not treat the trust factor(More)
Grid applications demand not only resources, but also trusted resources to avoid security crashes at remote sites in an open and risky Grid environment Benefiting many security-sensitive Grid applications: Scientific explorations, health-care Public safety, cyber crime control, homeland security Digital government, distance education, social community,(More)
Selfish behaviors of individual machines in a grid can potentially damage the performance of the system as a whole. However, scrutinizing the grid by taking into account the non-cooperativeness of machines is a largely unexplored research problem. In this paper, we first present a new hierarchical game-theoretic model of the grid that matches well with the(More)
This paper investigates a novel streaming architecture consisting of home-to-home online (H2O) devices that collaborate with one another to provide on-demand access to large repositories of continuous media such as audio and video clips. An H2O device is configured with a high bandwidth wireless communication component, a powerful processor, and gigabytes(More)
Selfish behaviors of individual machines in a grid can potentially damage the performance of the system as a whole. However, scrutinizing the grid by taking into account the noncooperativeness of machines is a largely unexplored research problem. In this paper, we first present a new hierarchical game-theoretic model of the grid that matches well with the(More)
The HECT-type ubiquitin ligase (E3) Smad ubiquitination regulatory factor 1 (Smurf1) targets various substrates, including Smad1/5, RhoA, Prickle 1, MEKK2, and JunB for degradation and thereby regulates adult bone formation and embryonic development. Here, we identify the endoplasmic reticulum (ER)-localized Wolfram syndrome protein (WFS1) as a specific(More)