By Topic

Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on

Date 8-11 Oct. 2012

Filter Results

Displaying Results 1 - 25 of 84
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (538 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Technical Program Co-chairs

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2012, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • In memory of professor Kwang H. (Kane) Kim

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Detecting Anomalous User Behaviors in Workflow-Driven Web Applications

    Publication Year: 2012, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Web applications are increasingly used as portals to interact with back-end database systems and support business processes. This type of data-centric workflow-driven web application is vulnerable to two types of security threats. The first is an request integrity attack, which stems from the vulnerabilities in the implementation of business logic within web applications. The second is guideline v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks

    Publication Year: 2012, Page(s):11 - 20
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence, we propose heuristics for Chord, Pastry and Kademl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking Dependability of MapReduce Systems

    Publication Year: 2012, Page(s):21 - 30
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    MapReduce is a popular programming model for distributed data processing. Extensive research has been conducted on the reliability of MapReduce, ranging from adaptive and on-demand fault-tolerance to new fault-tolerance models. However, realistic benchmarks are still missing to analyze and compare the effectiveness of these proposals. To date, most MapReduce fault-tolerance solutions have been eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics

    Publication Year: 2012, Page(s):31 - 40
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing approaches to aggregating CVSS scores usually cause useful semantics of individual scores to be lost in the aggregated result. In this paper, we address ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First Step toward Cloud-Based Firewalling

    Publication Year: 2012, Page(s):41 - 50
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    With the explosive growth of network-based services and attacks, the complexity and cost of firewall deployment and management have been increasing rapidly. Yet, each private network, no matter big or small, has to deploy and manage its own firewall, which is the critical first line of defense. To reduce the complexity and cost in deploying and managing firewalls, businesses have started to outsou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage

    Publication Year: 2012, Page(s):51 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    To protect outsourced data in cloud storage against corruptions, enabling integrity protection, fault tolerance, and efficient recovery for cloud storage becomes critical. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. Therefore, we study the problem of remotely checking th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TailCon: Power-Minimizing Tail Percentile Control of Response Time in Server Clusters

    Publication Year: 2012, Page(s):61 - 70
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    To provide satisfactory customer experience, modern server clusters like Amazon usually set Service Level Agreement (SLA) as guaranteeing a certain percentile (i.e. 99%) of the customer requests to have a response time within a threshold (i.e. 1s). One way to meet the SLA constraint is to serve the customer requests with sufficient computing capacity based on the worst case workload estimation in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LogMaster: Mining Event Correlations in Logs of Large-Scale Cluster Systems

    Publication Year: 2012, Page(s):71 - 80
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This paper presents a set of innovative algorithms and a system, named Log Master, for mining correlations of events that have multiple attributions, i.e., node ID, application ID, event type, and event severity, in logs of large-scale cloud and HPC systems. Different from traditional transactional data, e.g., supermarket purchases, system logs have their unique characteristics, and hence we propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RAM-DUR: In-Memory Deferred Update Replication

    Publication Year: 2012, Page(s):81 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Many database replication protocols are based on the deferred update replication technique. In deferred update replication, transactions are executed by a single server, and certified and possibly committed by every server. Thus, servers must store a full copy of the database. This assumption is detrimental to performance since servers may not be able to cache the entire database in main memory. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPECULA: Speculative Replication of Software Transactional Memory

    Publication Year: 2012, Page(s):91 - 100
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    This paper introduces SPECULA, a novel replication protocol for Software Transactional Memory (STM) systems that seeks maximum overlap between transaction execution and replica synchronization phases via speculative processing techniques. By removing the replica synchronization phase from the critical path of execution of transactions, SPECULA allows threads to speculatively pipeline the execution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Comparison of State-Machine-Based and Deferred-Update Replication Schemes

    Publication Year: 2012, Page(s):101 - 110
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In this paper, we analyze and experimentally compare state-machine-based and deferred-update (or transactional) replication, both relying on atomic broadcast. We define a model that describes the upper and lower bounds on the execution of concurrent requests by a service replicated using either scheme. The model is parametrized by the degree of parallelism in either scheme, the number of processor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • S-Paxos: Offloading the Leader for High Throughput State Machine Replication

    Publication Year: 2012, Page(s):111 - 120
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Implementations of state machine replication are prevalently using variants of Paxos or other leader-based protocols. Typically these protocols are also leader-centric, in the sense that the leader performs more work than the non-leader replicas. Such protocols scale poorly, because as the number of replicas or the load on the system increases, the leader replica quickly reaches the limits of one ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FORTRESS: Adding Intrusion-Resilience to Primary-Backup Server Systems

    Publication Year: 2012, Page(s):121 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Primary-backup replication enables arbitrary services, which need not be built as deterministic state machines, to be reliable against server crashes. Further, when the primary does not crash, the performance can be close to that of an un-replicated, 1-server system and is arguably far better than what state machine replication can offer. These advantages have made primary-backup replication a wid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Backup to Hot Standby: High Availability for HDFS

    Publication Year: 2012, Page(s):131 - 140
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Cluster-based distributed file systems generally have a single master to service clients and manage the namespace. Although simple and efficient, that design compromises availability, because the failure of the master takes the entire system down. Before version 2.0.0-alpha, the Hadoop Distributed File System (HDFS) -- an open-source storage, widely used by applications that operate over large dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.