Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems

31-31 Oct. 1997

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1997
    Request permission for reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • From legacy RPC services to distributed objects

    Publication Year: 1997, Page(s):2 - 7
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (593 KB)

    The remote procedure call (RPC) paradigm has successfully modeled several sophisticated client-server applications. It provides a simple and efficient way to develop distributed programs. The concept of RPC comes from procedure-based programming languages. As object-oriented technologies grow, the idea of invoking program entities on different address spaces also comes into object-oriented softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocols versus objects: can models for telecommunications and distributed processing coexist?

    Publication Year: 1997, Page(s):8 - 13
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (611 KB)

    This paper identifies two paradigms that influence the design of telematics systems nowadays: the protocol-centred and the object-centred paradigms. Both paradigms have been introduced to cope with interoperability, each in their own way. The coexistence of these paradigms can have an enormous impact on the design of telematics systems. This paper identifies some combined uses of both paradigms an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replicating objects using the CORBA Event Service?

    Publication Year: 1997, Page(s):14 - 19
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (673 KB)

    The Common Object Request Broker Architecture (CORBA) is becoming a standard for distributed application middleware, but no support is currently provided to handle object replication. In this paper, we discuss the relevance of using the Object Management Group's Event Service for replicating objects in a CORBA environment and compare it to other approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software platform for secure applications based on CORBA

    Publication Year: 1997, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (591 KB)

    Shows an architecture for providing security services in a CORBA-based environment. We design it to follow the CORBA security specification and implement a prototype using a commercial product. The platform provides common security mechanisms such as authentication and access control for CORBA-based applications. It also has the security context management function, which is responsible for protec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion ripple analysis in distributed information systems

    Publication Year: 1997, Page(s):28 - 33
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (515 KB)

    Security is a very important aspect of distributed computing systems, especially in distributed information environments involving wide-area networks, such as internets. This paper addresses how a security breach, such as intrusion, propagates through a distributed or networked information system. In particular, the issue of how an intrusion, once it occurrs, propagates through a distributed syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic key recovery

    Publication Year: 1997, Page(s):34 - 37
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (341 KB)

    Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption. Encryption uses "keys" to encrypt and decrypt the information. Without having the crypto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewall placement in a large network topology

    Publication Year: 1997, Page(s):40 - 45
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (585 KB)

    Network security is an integral component of a multi-user distributed information environment. Firewall (FW) technology is a popular approach to build secure networks, and a plethora of FWs have been designed. Our research focuses on the placement of FWs (i.e. an operations research approach) in a large, complex network system, or a system of systems. A key contribution of this research is to prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interdomain access control with policy routing

    Publication Year: 1997, Page(s):46 - 52
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (650 KB)

    An internetwork consists of heterogeneous domains managed under different administrative authorities. For secure interdomain resource sharing, it is necessary to implement an interdomain access control (IAC) protocol to regulate traffic flow between end-to-end domains and among transit domains. Control of traffic flow in transit domains is closely related to network packet routing protocols. There... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Saga Security System: a security architecture for open distributed systems

    Publication Year: 1997, Page(s):53 - 58
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (651 KB)

    We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The authorization model in the Saga Security System (the Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as object-oriented systems and cooperative agent systems. The k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed transaction processing as a reliability concept for mobile agents

    Publication Year: 1997, Page(s):59 - 64
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (631 KB)

    Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their implementations have been proposed. With the increasing market of electronic commerce it becomes an interesting idea to use autonomous mobile agents for electronic business transactions. Being involved in money transactions, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical mapping scheme for mobile agent systems

    Publication Year: 1997, Page(s):66 - 71
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    MESSENGERS is a system for general-purpose distributed computing based on the principles of mobile agents. Its underlying infrastructure consists of a collection of daemon processes, whose task it is to receive incoming agents, provide the necessary environment for their execution, and send them on to their next destinations as dictated by their behaviors. The structure of the daemon processes and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed simulation based monitoring

    Publication Year: 1997, Page(s):72 - 77
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    MSS, a computer-based monitoring system with integrated cooperative objects is proposed. MSS uses an object-based framework to interface with the user to guide a specific system evolution. MSS espouses a blackboard architecture and runs according a cooperating objects model. To achieve monitoring tasks, MSS selects the appropriate technique(s) within a set of a high performance algorithms. From th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entry consistency versus lazy release consistency in DSM systems: analytical comparison and a new hybrid solution

    Publication Year: 1997, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (527 KB)

    Entry consistency (EC), implemented in Midway, and lazy release consistency (LRC), implemented in TreadMarks, are two promising relaxed memory consistency models which tend to minimize communication costs. This is an important goal of software-based distributed shared memory (DSM) solutions built on workstation networks. While Midway uses a fine-grain update-based coherence protocol, TreadMarks im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an efficient probabilistic deadlock detection method for multidatabase systems

    Publication Year: 1997, Page(s):84 - 89
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (541 KB)

    Deadlock detection is an important issue in multidatabase systems. Due to the autonomy of the local systems, the visibility of the state of local transactions and the contention on items is not available. The well known PCG method exploits a weaker mean condition to detect potential global deadlock, that does not necessarily correspond to a real one. We present a probabilistic analysis of PCG usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The universality of a class of (2log/sub 2/N-1)-stage interconnection networks

    Publication Year: 1997, Page(s):92 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (602 KB)

    The performance of a highly-parallel multiprocessor system depends heavily on the efficiency of its interconnection network. We focus on an N/spl times/N, (2log/sub 2/N-1)-stage interconnection network. A concatenated (2log/sub 2/N-1)-stage interconnection network (denoted by (/spl Delta//spl oplus//spl Delta/')) is a combination of two, cube-type networks with the rightmost stage of /spl Delta/ a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A solution to atomic commitment based on an extended consensus protocol

    Publication Year: 1997, Page(s):98 - 103
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (603 KB)

    Chandra and Toueg (1996) have proposed a new approach to overcome the impossibility of deterministically reaching consensus in asynchronous systems subject to crash failures. They augment the asynchronous model with unreliable failure detectors. We present an extension of an algorithm that they proposed to solve consensus using /spl square/S failure detectors. We argue that this extension is a sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of rollback recovery to program locality of reference and page replacement policies

    Publication Year: 1997, Page(s):104 - 109
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (535 KB)

    We study the impact of checkpointing-based fault tolerance on the program locality of reference and memory page (or cache block) replacement policies. We demonstrate that the current research in page/block replacement algorithms may not operate well with fault-tolerant programs. We include the identification of this critical research topic, and the development of an analytical model for fault prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Internet collaborative environment for sharing Java applications

    Publication Year: 1997, Page(s):112 - 117
    Cited by:  Papers (14)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (534 KB)

    In the Internet community there is a strong demand for platform-independent collaboration software. Java is developed with the major design goals of being a platform-independent, and Internet-oriented programming language. We show how a group of Internet users can share single-user Java applications for synchronous collaboration. Our approach is based on a replicated tool architecture in which eac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative concurrency control on the Web

    Publication Year: 1997, Page(s):118 - 123
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (705 KB)

    Sharing of data in collaborative environments requires mechanisms that ensure the consistency of data in spite of concurrency and failures. This is traditionally handled by transactions or extended transaction mechanisms. The World Wide Web, although originally designed as an information storage and retrieval system, is being extended to serve as a vehicle for collaboration. However, the proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with the electronic classroom-QoS issues in an advanced teaching and research facility

    Publication Year: 1997, Page(s):124 - 129
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (713 KB)

    Distance education refers to all types of studies in which students are separated in space and/or time. The electronic classroom at the University of Oslo overcomes separations in space by exchanging digital audio, video, and whiteboard information between different sites. This paper presents measurements and analysis results of transport level and application level quality-of-service (QoS) aspect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic computing and CDMA

    Publication Year: 1997, Page(s):132 - 137
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    This paper shows how reliable data services can be provided in an error prone wireless environment using CDMA and a link layer retransmission protocol. A CDMA encoder using Walsh codes for 1.85 to 1.99 GHz PCS applications is simulated under various error conditions with varying packet size to determine minimum acceptable QOS relative to error templates. The error templates and data rates of 16, 3... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating state information in mobile environments

    Publication Year: 1997, Page(s):138 - 143
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (617 KB)

    Several studies point out the deficiencies of the transport protocol TCP in wireless scenarios. Falsely, TCP's congestion avoidance mechanisms are triggered by packets that are destroyed due to the high bit error probability of wireless channels or loss due to disruptions caused by handoffs. This can be avoided, if the indirect transport protocol model approach is applied. It subdivides the end-to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent handling of communication media

    Publication Year: 1997, Page(s):144 - 150
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (870 KB)

    Personal communication support enhances control over reachability in telecommunication. Conversion and screening technologies of communication media, combined with QoS evaluation, allow to focus on the semantics of the information instead of the carriage. The paper considers how a CORBA-based implementation allows scaling from Java clients to IN service nodes and TINA integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of cache coherency schemes in a shared disks transaction environment

    Publication Year: 1997, Page(s):154 - 161
    Cited by:  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (903 KB)

    In a shared disks environment (SDE), the computing nodes are locally coupled via a high-speed network and share a common database at the disk level. To reduce the amount of expensive and slow disk I/O, each node caches database pages in its main memory buffer. This paper focuses on SDE that uses record-level locking as a concurrency control. While the record-level locking can guarantee higher conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.