Towards Fault-Tolerant and Secure Agentry

نویسنده

  • Fred B. Schneider
چکیده

Concurrent programs are traditionally described in terms of processes, an abstraction that hides the identity of the processor doing the actual execution. This hiding allows processes to be implemented by time-multiplexing one or more identical processors, making the process abstraction well suited for concurrent programs--like operating systems and scientific codestha t will be executed on uniprocessors and multiproeessors. It is unreasonable to suppose that the processors comprising even a modestsized network would be identical. Moreover, a user's security authorizations are likely to differ from site to site in a network, so even were the network's processors identical, they would not necessarily behave in that way. An abstraction that hides processor identities is, therefore, not as suitable for programming networks. An agent is like a process except that, while running, an agent can specify and change the processor on which it is executed. Having the identity of processors be under program control is attractive for a variety of technical reasons:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Middleware for Constructing Highly Available, Fault Tolerant, and Attack Tolerant Services

This paper describes the design of a middleware that provides support for constructing highly available, secure, fault-tolerant, and attack-tolerant services. The central component of this middleware is a group communication service that comprises of six network protocols: atomic broadcast, group membership, failure detection, attack detection, group access control, and secure intermember commu...

متن کامل

Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures

Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where an attacker has broken into the system. A relatively recent feature of these schemes is resistance against truncations, i.e. the deletion and/or replacement of the end of the log file. This is esp...

متن کامل

Classical leakage resilience from fault-tolerant quantum computation

Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks. The problem of secure computation in the presence of leakage is generally known as leakage resilience. In this work, we establish a connection between leakage resilience and fault-tolerant quantum computation. We first prove that for a general leakage model, ther...

متن کامل

Design of a Secure and Fault Tolerant Environment for Distributed Storage

We discuss the design and evaluation of a secure and fault tolerant storage infrastructure for un-trusted distributed computing environments. Previous designs of storage systems for this space have tended to use decoupled mechanisms for achieving fault tolerance and security. Our design, based on cryptographic properties of error-correction odes, combines redundancy (for fault tolerance) and en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997