[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst
From: |
Hermanni Hyytiälä |
Subject: |
[Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst |
Date: |
Fri, 06 Jun 2003 04:37:25 -0400 |
CVSROOT: /cvsroot/storm
Module name: storm
Branch:
Changes by: Hermanni Hyytiälä <address@hidden> 03/06/06 04:37:25
Modified files:
doc/pegboard/attacking_gisp--hemppah: peg.rst
Log message:
more
CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/storm/storm/doc/pegboard/attacking_gisp--hemppah/peg.rst.diff?tr1=1.7&tr2=1.8&r1=text&r2=text
Patches:
Index: storm/doc/pegboard/attacking_gisp--hemppah/peg.rst
diff -u storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.7
storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.8
--- storm/doc/pegboard/attacking_gisp--hemppah/peg.rst:1.7 Fri Jun 6
04:33:10 2003
+++ storm/doc/pegboard/attacking_gisp--hemppah/peg.rst Fri Jun 6 04:37:25 2003
@@ -5,8 +5,8 @@
:Authors: Hermanni Hyytiälä
:Date-Created: 2003-06-05
-:Last-Modified: $Date: 2003/06/06 08:33:10 $
-:Revision: $Revision: 1.7 $
+:Last-Modified: $Date: 2003/06/06 08:37:25 $
+:Revision: $Revision: 1.8 $
:Status: Incomplete
.. :Stakeholders:
@@ -38,7 +38,7 @@
- Does GISP have *obvious* exploits ?
-- If there are exlpoits, how easily they can be used by an
+- If there are exploits how easily they can be used by an
hostile peer ?
- Is GISP resilient against (hostile) attacks or not ?
@@ -62,7 +62,7 @@
- A hostile (or faulty) peer(s) gives false information during queries
-- A hostile (or faulty) peer(s)'s queries/replies include loads of rubbish,
e.g.,
+- A hostile (or faulty) peer(s)'s queries/replies include loads of rubbish,
i.e.,
wrong XML-scheme, wrong string/text encoding, or doesn't otherwise follow
the protocol
- A hostile (or faulty) peer(s) performs many queries randomly
@@ -73,8 +73,8 @@
- A hostile (or faulty) peer(s) stores lot of dummy key-value-pairs with a
certain key
-During the simulation process we will use a single hostile/faulty peer
-or a group of hostile/faulty peers (fraction of all peers).
+During the simulation process we will use a single hostile (or faulty) peer
+or a group of hostile/faulty peers (fraction of all peers) in the test
network.
By using above scenarios, we want to clarify GISP's properties with regard to
research
questions.
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/05
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst,
Hermanni Hyytiälä <=
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/06
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10
- [Gzz-commits] storm/doc/pegboard/attacking_gisp--hemppah peg.rst, Hermanni Hyytiälä, 2003/06/10