{"id":"https://openalex.org/W2035416007","doi":"https://doi.org/10.1145/1879082.1879093","title":"Tiered incentives for integrity based queuing","display_name":"Tiered incentives for integrity based queuing","publication_year":2010,"publication_date":"2010-10-03","ids":{"openalex":"https://openalex.org/W2035416007","doi":"https://doi.org/10.1145/1879082.1879093","mag":"2035416007"},"language":"en","primary_location":{"id":"doi:10.1145/1879082.1879093","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1879082.1879093","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077470897","display_name":"Fariba Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fariba Khan","raw_affiliation_strings":["University of Illinois at Urbana-Champaign","University of Illinois at Urbana Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031954035","display_name":"Carl A. Gunter","orcid":"https://orcid.org/0009-0006-6943-0684"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carl A. Gunter","raw_affiliation_strings":["University of Illinois at Urbana-Champaign","University of Illinois at Urbana Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana Champaign","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077470897"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":0.7438,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.733834,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7733079791069031},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6663140058517456},{"id":"https://openalex.org/keywords/queueing-theory","display_name":"Queueing theory","score":0.6594351530075073},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6462870836257935},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5646935701370239},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5279760956764221},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5216149091720581},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5107512474060059},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4742801785469055},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.4739432632923126},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4026941955089569},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.34423696994781494},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13811036944389343}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7733079791069031},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6663140058517456},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.6594351530075073},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6462870836257935},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5646935701370239},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5279760956764221},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5216149091720581},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5107512474060059},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4742801785469055},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.4739432632923126},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4026941955089569},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34423696994781494},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13811036944389343},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1879082.1879093","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1879082.1879093","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.645.4724","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.645.4724","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://netecon.seas.harvard.edu/NetEcon10/Papers/Khan10.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7049772205","display_name":null,"funder_award_id":"90TR0003-01","funder_id":"https://openalex.org/F4320306085","funder_display_name":"U.S. Department of Health and Human Services"},{"id":"https://openalex.org/G809335000","display_name":null,"funder_award_id":"CNS 09-64392CNS 09-17218CNS 07-16626CNS 07-16421CNS 05-24695","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306085","display_name":"U.S. Department of Health and Human Services","ror":"https://ror.org/033jnv181"},{"id":"https://openalex.org/F4320306142","display_name":"John D. and Catherine T. MacArthur Foundation","ror":"https://ror.org/00dxczh48"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W192498908","https://openalex.org/W205175404","https://openalex.org/W1563061804","https://openalex.org/W1573705733","https://openalex.org/W1601814439","https://openalex.org/W1867219652","https://openalex.org/W1999955156","https://openalex.org/W2073440460","https://openalex.org/W2076516498","https://openalex.org/W2081357650","https://openalex.org/W2097602077","https://openalex.org/W2126880366","https://openalex.org/W2130327661","https://openalex.org/W2136262545","https://openalex.org/W2140471436","https://openalex.org/W2147884201","https://openalex.org/W2154178154","https://openalex.org/W2155141181","https://openalex.org/W2400355313","https://openalex.org/W3163054746","https://openalex.org/W3163287424","https://openalex.org/W6814336774"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2610693083","https://openalex.org/W2116285675","https://openalex.org/W3207673621","https://openalex.org/W1533309011","https://openalex.org/W75616540","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488"],"abstract_inverted_index":{"We":[0,69,84,94],"propose":[1],"an":[2],"tiered":[3],"incentive":[4],"system":[5,35],"called":[6],"Integrity-Based":[7],"Queuing":[8],"(IBQ)":[9],"for":[10,64,89,98],"protection":[11],"against":[12],"Internet":[13],"Distributed":[14],"Denial-of-Service":[15],"(DDoS)":[16],"attacks.":[17],"Our":[18],"proposal":[19],"can":[20,51],"be":[21,53],"implemented":[22],"step-by-step":[23],"where":[24],"each":[25],"integrity":[26,80],"improvement":[27],"brings":[28],"a":[29,72],"direct":[30],"benefit":[31,60],"to":[32,75,78],"the":[33,82,87],"autonomous":[34],"making":[36],"it.":[37],"IBQ":[38,97],"proposes":[39],"preferential":[40],"queuing":[41,91],"based":[42],"on":[43],"integrity:":[44],"good,":[45],"bad":[46],"and":[47,92,103],"middle.":[48],"Since":[49],"implementation":[50],"rarely":[52],"complete":[54],"or":[55],"network-wide":[56],"we":[57],"provide":[58],"incremental":[59],"by":[61],"prioritizing":[62],"service":[63],"domains":[65],"with":[66,100,108],"better":[67],"integrity.":[68],"have":[70,85,95],"provided":[71],"basic":[73],"analysis":[74],"relate":[76],"performance":[77,106],"measurable":[79],"of":[81],"client.":[83],"designed":[86],"architecture":[88],"authentication,":[90],"defense.":[93],"tested":[96],"applications":[99],"real-time":[101],"requirements":[102],"show":[104],"how":[105],"improves":[107],"higher":[109],"assurance.":[110]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
