Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems

22-22 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 57
  • Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Workshop on Reliable Middleware (Wremi) Foreward

    Publication Year: 1999, Page(s): 309
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Workshop on Electronic Commerce (Welcom) Foreward

    Publication Year: 1999, Page(s): 329
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999, Page(s):401 - 402
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • Optimistic recovery in multi-threaded distributed systems

    Publication Year: 1999, Page(s):234 - 243
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    The problem of recovering distributed systems from crash failures has been widely studied in the context of traditional non-threaded processes. However, extending those solutions to the multi-threaded scenario presents new problems. We identify and address these problems for optimistic logging protocols. There are two natural extension to optimistic logging protocols in the multi-threaded scenario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and electronic commerce-more than a technical problem

    Publication Year: 1999, Page(s):360 - 365
    Cited by:  Papers (7)  |  Patents (75)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    It is argued that the building of trust in electronic commerce depends only partly on technical security, and the knowledge of security gaps and ways of closing them. It is not only a technical system which is trusted but rather a socio-technical system, including users, business practices and related institutions. We take a closer look at the concept of trust and its relation to knowledge, descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of future telephone networks

    Publication Year: 1999, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tolerating transient faults in statically scheduled safety-critical embedded systems

    Publication Year: 1999, Page(s):212 - 221
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Static off-line scheduling ensures predictability of worst-case behavior and high resource utilization for safety-critical applications but lacks the flexibility needed to deal with run-time fault-tolerance. We present a temporal redundancy-based recovery technique that tolerates transient task failures in statically scheduled distributed embedded systems where tasks have timing, resource, and pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical guideline to the implementation of online shops

    Publication Year: 1999, Page(s):348 - 353
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Implementing an online shop can be a risky project, since there's no widespread and profound knowledge or experiences. This guideline is intended to support the management of organizational, technical and human challenges in online shop implementation projects. An overview of the implementation process is given. Subsequently, the development of a concept, using the services offered by a company to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security mechanisms for using mobile agents in electronic commerce

    Publication Year: 1999, Page(s):378 - 383
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malicious agents, agents must be protected from other agents and also agents must be protected from malicious hosts. For solving the first three problems, existing technology from operating systems and distributed systems resea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML documents production for an electronic platform of requests for proposals

    Publication Year: 1999, Page(s):330 - 335
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Addresses the problem of document production in the context of an electronic market application, namely a platform dealing with requests for proposals (RFP). Our project relies on XML as the leading technology, in accordance with a general trend in electronic commerce. The consequences of the RFP workflow on the document publishing requirements are motivated. Various aspects of the XML technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving level of service for mobile users using context-awareness

    Publication Year: 1999, Page(s):24 - 33
    Cited by:  Papers (11)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The development of mobile computing combined, with the exponential growth of the Internet leads to new challenges in the development of large-scale information systems. As they move, users may experience dramatic variations in their environment, in terms of latency, network bandwidth, available services around etc. As a consequence, the level of service of the provided information may strongly dep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time fault-tolerant atomic broadcast

    Publication Year: 1999, Page(s):48 - 55
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    We present algorithms for real-time fault-tolerant uniform atomic broadcast. We first design a distributed execution model for asynchronous systems with crash failure (called synchronized phase system (SPS)), then we give an algorithm for atomic broadcast in SPS. In an SPS, the processes try to run in synchronized sounds like in synchronous systems. SPSs can be implemented in asynchronous systems,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal hazard analysis of hybrid systems in cTLA

    Publication Year: 1999, Page(s):68 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard analysis which is performed according to procedures (e.g., Ha2Op) where experts discuss a series of informal argumentations. Each argumentation considers a specific required system property. Formal property pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HAMFS file system

    Publication Year: 1999, Page(s):190 - 201
    Cited by:  Papers (1)  |  Patents (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Unix's lack of a robust and expandable file system has become a significant problem with the growth of Unix in large commercial environments. The HAMFS (highly available multi-server file system) is a cluster file system designed to address this need. HAMFS offers disk-pooling, supports off-the-shelf disks, and automatically balances file load across disks dynamically. Data residing in a disk pool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerance in three-tier applications: focusing on the database tier

    Publication Year: 1999, Page(s):322 - 327
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Discusses the issues involved in providing an integrated fault tolerance solution to enterprise applications with a distributed three-tier architecture. We examine end-to-end fault tolerance requirements for interactions between the tiers and describe available solutions. We perform a detailed assessment of fault tolerance technologies that are available for the database tier, which poses most cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient checkpointing algorithm for distributed systems implementing reliable communication channels

    Publication Year: 1999, Page(s):290 - 291
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB)

    This paper presents a new checkpointing algorithm that guarantees the semantics of reliable communication channels despite the crash and recovery of processes. This algorithm requires O(n+m) communication messages, where n is the number of participating processes, and m is the number of “late” messages. The algorithm is nonblocking, requires minimal message logging, and has minimal sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for fault-tolerance in hard real-time distributed systems

    Publication Year: 1999, Page(s):292 - 293
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    The presence of hard timing constraints makes the design of fault tolerant systems difficult because when tasks are replicated to treat errors, both the task replicas and the fault tolerance building blocks (e.g., consensus) must be taken into account in the feasibility tests. This paper is devoted to the description of an approach for managing failures in hard real time distributed systems. Our a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authorization methods for e-commerce applications

    Publication Year: 1999, Page(s):366 - 371
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    In the recent past, a lot of work has been done in establishing public key infrastructures (PKIs) for electronic commerce (e-commerce) applications Unfortunately, most of these PKIs can only be used to authenticate the participants of e-commerce applications; they can't be used to properly authorize the participants and to control access to system resources accordingly. Consequently, these PKIs ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault injection based on a partial view of the global state of a distributed system

    Publication Year: 1999, Page(s):168 - 177
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    This paper describes the basis for and preliminary implementation of a new fault injector, called Loki, developed specifically for distributed systems. Loki addresses issues related to injecting correlated faults in distributed systems. In Loki, fault injection is performed based on a partial view of the global state of an application. In particular, facilities are provided to pass user-specified ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software multilevel fault injection mechanism: case study evaluating the Virtual Interface Architecture

    Publication Year: 1999, Page(s):306 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (16 KB)

    The characteristics of failures occurring in networked computing systems are still poorly understood. As a consequence, this is a rich area for exploration, especially with the arrival of new network interface standards, such as the Virtual Interface Architecture (VIA) adopted by Microsoft, Intel and Compaq. The goal of VIA is to improve the performance of distributed applications by reducing the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CosNamingFT-a fault-tolerant CORBA naming service

    Publication Year: 1999, Page(s):254 - 262
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    This paper describes the design and implementation of a fault-tolerant CORBA naming service-CosNaming FT. Every CORBA object is accessed through its Interoperable Object Reference (IOR), which is registered with the CORBA name service. The name service therefore is a critical gateway to all objects in a distributed system; to avoid having a single point of failure, the name service should be made ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive checkpointing protocol to bound recovery time with message logging

    Publication Year: 1999, Page(s):244 - 252
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures. These solutions are often not applicable due to the lack of accurate data on the probability distribution of failures. Most current checkpoint libraries require application users to define a fixed time interval for check... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gateways to overcome incompatibilities of security mechanisms

    Publication Year: 1999, Page(s):372 - 377
    Cited by:  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    We describe the use of security gateways to overcome incompatibilities and configuration differences between acting parties participating in distributed applications. We present different variants and discuss their relative advantages in different scenarios considering possible attacks, performance and ease of use View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.