By Topic

Reliable Distributed Systems, 1993. Proceedings., 12th Symposium on

Date 6-8 Oct. 1993

Filter Results

Displaying Results 1 - 16 of 16
  • Proceedings of 1993 IEEE 12th Symposium on Reliable Distributed Systems

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Bayesian analysis for fault location in homogeneous distributed systems

    Publication Year: 1993, Page(s):44 - 53
    Cited by:  Papers (4)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    A simple and practical probabilistic comparison-based model, employing multiple incomplete test concepts, for handling fault location in distributed systems using a Bayesian analysis procedure is proposed. This approach is more practical and complete than previous ones since it does not assume any conditions such as permanently faulty units, complete tests, perfect environments, or non-malicious e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient transparent optimistic rollback recovery for distributed application programs

    Publication Year: 1993, Page(s):86 - 95
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1204 KB)

    A transparent rollback-recovery method that adds very little overhead to distributed application programs and efficiently supports the quick commit of all output to the outside world is introduced. Each process can independently choose at any time either to use checkpointing alone (as in consistent checkpointing) or to use optimistic message logging. The system is based on a new commit algorithm t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing secure distributed systems using components

    Publication Year: 1993, Page(s):143 - 152
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    Current hookup theories may impose overstrong security requirements on component systems. To overcome this problem, connectivities of the components may have to be considered in order to appropriately handle their composition. Such a consideration is used here to describe composable security properties. Security requirements are enforced only on some input and output entities of each component wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using logging and asynchronous checkpointing to implement recoverable distributed shared memory

    Publication Year: 1993, Page(s):58 - 67
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Distributed shared memory provides a useful paradigm for developing distributed applications. As the number of processors in the system and running time of distributed applications increase, the likelihood of processor failure increases. A method of recovering processes running in a distributed shared memory environment which minimizes lost work and the cost of recovery is desirable so that long-r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processor group membership protocols: specification, design and implementation

    Publication Year: 1993, Page(s):2 - 11
    Cited by:  Papers (23)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB)

    The specification, design and implementation of a set of protocols to solve the processor group membership problem in distributed systems are presented. These group membership protocols were developed as part of a toolkit for building distributed/parallel applications on a cluster of workstations. The group membership service forms the lowest layer in the toolkit, and is the glue which unifies all... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An O(1) quorum consensus protocol tailored for the client/server architecture

    Publication Year: 1993, Page(s):98 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    In a client/server architecture, replicated copies of an object are assigned to different servers (possibly client sites) in order to increase the availability of the database in case some but not all servers fail. A highly efficient, highly reliable quorum consensus protocol, the Quorum Rings protocol (QRP), specifically designed to take advantage of the client/server architecture, is introduced.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A compositional proof theory for fault tolerant real-time distributed systems

    Publication Year: 1993, Page(s):34 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    A compositional network proof theory for specifying and verifying fault tolerant real-time distributed systems is presented. Important in such systems is the failure hypothesis that stipulates the class of failures that must be tolerated. In the formalism presented, the failure hypothesis of a system is represented by a predicate which expresses how faults might transform the behavior of the syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lazy checkpoint coordination for bounding rollback propagation

    Publication Year: 1993, Page(s):78 - 85
    Cited by:  Papers (29)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    The technique of lazy checkpoint coordination, which preserves process autonomy while employing communication-induced checkpoint coordination for bounding rollback propagation is proposed. The notion of laziness is introduced to control the coordination frequency and allow a flexible tradeoff between the cost of checkpoint coordination and the average rollback distance. Worst-case overhead analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks

    Publication Year: 1993, Page(s):136 - 141
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Authentication and key distribution protocols that utilize weak secrets (such as passwords and personal identification numbers) are traditionally susceptible to guessing attacks whereby an adversary iterates through a relatively small key space and verifies the correct guess. Such attacks can be defeated by the use of public key encryption and careful protocol construction. T. Lomas et al. (Proc. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for combinatorial performance and availability analysis

    Publication Year: 1993, Page(s):24 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    The common approach to formulating and solving combined reliability/availability and performance problems is to use Markov reward models. However, the large size of state spaces is a problem that plagues Markovian models. Combinatorial models have been used for modeling reliability and availability of complex systems without paying the price of large Markov models. Yet, assumptions of two-state be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rollback based on vector time

    Publication Year: 1993, Page(s):68 - 77
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Causality, as made concrete by Lamport's "happened before" relation, is the central underlying basis in the design of optimistic protocols for checkpoint and recovery. After the recovery of a formerly failed process, all events and messages which causally follow the events and messages discarded by restoration of a state checkpoint must be discarded also. The isomorphism between causality and vect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure two phase locking protocol

    Publication Year: 1993, Page(s):126 - 135
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    A secure concurrency control algorithm must, in addition to maintaining consistency of the database, be free from covert channels arising due to data conflicts between transactions. The existing secure concurrency control approaches are unfair to transactions at higher access classes. A secure two-phase locking protocol that is shown to be free from covert channels arising due to data conflicts be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • APRICOTS a prototype implementation of a ConTract system: management of the control flow and the communication system

    Publication Year: 1993, Page(s):12 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    The principle of transactions has been proven in the field of database systems. However, there are many fields where classical transactions are not suitable to model the actions of the real world. An approach to extend the principle of transactions is the ConTract model, which weakens some demands of the ACID-principle but at the same time includes other features. An approach to implement a ConTra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using atomic broadcast to implement a posteriori agreement for clock synchronization

    Publication Year: 1993, Page(s):115 - 124
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB)

    A clock synchronization algorithm was given by P. Verissimo et al. (1989), dubbed a posteriori agreement, a variant of the convergence nonaveraging technique. By exploiting the characteristics of broadcast networks, the effect of message delivery delay variance is largely reduced. In consequence, the precision achieved by the algorithm is drastically improved. Accuracy preservation is near to opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to constructing modular fault-tolerant protocols

    Publication Year: 1993, Page(s):105 - 114
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    Modularization is a well-known technique for simplifying complex software. An approach to modularizing fault-tolerant protocols such as reliable multicast and membership is described. The approach is based on implementing a protocol's individual properties as separate microprotocols and then combining selected microprotocols using an event-driven software framework. A system is constructed by comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.