Login / Signup
Stealth modification versus nuisance attacks in the LOCKSS peer-to-peer digital preservation system.
Mema Roussopoulos
Prashanth P. Bungale
Published in:
Peer-to-Peer Netw. Appl. (2010)
Keyphrases
</>
digital preservation
peer to peer
digital libraries
long term
digital objects
metadata
digital information
data grid
digital content
enterprise architecture
data sharing
fault tolerance
distributed computing
grid computing
distributed environment
load balancing
intrusion detection