references - rd.springer.com978-1-4471-2416-0/1.pdf · references abbott, m., peterson, l.:...

28
References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5), 600–610 (1993) Abraham, I., Malkhi, D.: Probabilistic quorums for dynamic systems. In: The 17th International Symposium on Distributed Computing (DISC 2003), Sorento, Italy, October 2003 Agapi, A., Birman, K., Broberg, R., Cotton, C., Kielmann, T., Millnert, M., Payne, R., Surton, R., van Renesse, R.: Routers for the cloud: Can the Internet achieve 5-nines availability? IEEE Internet Comput. 15(5), 72–77 (2011) Agarwal, D.A.: Totem: A reliable ordered delivery protocol for interconnected local area networks. Ph.D. diss., Department of Electrical and Computer Engineering, University of California, Santa Barbara (1994) Aguilera, M.K., Strom, R.E., Sturman, D.C., Astley, M., Chandra, T.D.: Matching events in a content-based subscription system. In: 18th ACM Symposium on Principles of Distributed Computing (PODC), Atlanta, GA (1999) Aguilera, M., Keidar, I., Malkhi, D., Shraer, A.: Dynamic atomic storage without consensus. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC) (2009a) Aguilera, M.K., Merchant, A., Shah, M., Veitch, A., Karamanolis, C.: Sinfonia: A new paradigm for building scalable distributed systems. ACM Trans. Comput. Syst. 27(3), 5 (2009b) Ahamad, M., Burns, J., Hutto, P., Neiger, G.: Causal memory. Technical Report, College of Com- puting, Georgia Institute of Technology, July (1991) Alon, N., Barak, A., Manber, U.: On disseminating information reliably without broadcasting. In: Proceedings of the Seventh International Conference on Distributed Computing Systems, Berlin, September, pp. 74–81. IEEE Computer Society Press, New York (1987) Alonso, R., Korth, F.: Database issues in nomadic computing. In: Proceedings of the ACM SIG- MOD International Conference on Mannagement of Data, Washington, DC, May 1993, pp. 388–392 (1993) Alvisi, L., Bressoud, T., El-Khasab, A., Marzullo, K., Zagorodnov, D.: Wrapping server-side TCP to mask connection failures. In: INFOCOMM 2001, Anchorage, Alaska, 22–26 April 2001, vol. 1, pp. 329–337 (2001a) Alvisi, L., Malkhi, D., Pierce, E., Reiter, M.: Fault detection for byzantine quorum systems. IEEE Trans. Parallel Distrib. Syst. 12(9), 996–1007 (2001b) Amir, Y.: Replication using group communication over a partitioned network. Ph.D. diss., Hebrew University of Jerusalem (1995) Amir, Y., Dolev, D., Kramer, S., Malkhi, D.: Membership algorithms in broadcast domains. In: Proceedings of the Sixth WDAG, Israel, June 1992. Lecture Notes in Computer Science, vol. 647, pp. 292–312. Springer, Berlin (1992a) Amir, Y., Dolev, D., Kramer, S., Malkhi, D.: Transis: A communication subsystem for high avail- ability. In: Proceedings of the Twenty-Second Symposium on Fault-Tolerant Computing Sys- tems, Boston, July 1992, pp. 76–84. IEEE Computer Society Press, New York (1992b) Amir, O., Amir, Y., Dolev, D.: A highly available application in the Transis environment. In: Pro- ceedings of the Workshop on Hardware and Software Architectures for Fault Tolerance. Lecture Notes in Computer Science, vol. 774, pp. 125–139. Springer, Berlin (1994) K.P. Birman, Guide to Reliable Distributed Systems, Texts in Computer Science, DOI 10.1007/978-1-4471-2416-0, © Springer-Verlag London Limited 2012 703

Upload: buidang

Post on 20-Aug-2019

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References

Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACMTrans. Netw. 1(5), 600–610 (1993)

Abraham, I., Malkhi, D.: Probabilistic quorums for dynamic systems. In: The 17th InternationalSymposium on Distributed Computing (DISC 2003), Sorento, Italy, October 2003

Agapi, A., Birman, K., Broberg, R., Cotton, C., Kielmann, T., Millnert, M., Payne, R., Surton, R.,van Renesse, R.: Routers for the cloud: Can the Internet achieve 5-nines availability? IEEEInternet Comput. 15(5), 72–77 (2011)

Agarwal, D.A.: Totem: A reliable ordered delivery protocol for interconnected local area networks.Ph.D. diss., Department of Electrical and Computer Engineering, University of California,Santa Barbara (1994)

Aguilera, M.K., Strom, R.E., Sturman, D.C., Astley, M., Chandra, T.D.: Matching events in acontent-based subscription system. In: 18th ACM Symposium on Principles of DistributedComputing (PODC), Atlanta, GA (1999)

Aguilera, M., Keidar, I., Malkhi, D., Shraer, A.: Dynamic atomic storage without consensus. In:Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC) (2009a)

Aguilera, M.K., Merchant, A., Shah, M., Veitch, A., Karamanolis, C.: Sinfonia: A new paradigmfor building scalable distributed systems. ACM Trans. Comput. Syst. 27(3), 5 (2009b)

Ahamad, M., Burns, J., Hutto, P., Neiger, G.: Causal memory. Technical Report, College of Com-puting, Georgia Institute of Technology, July (1991)

Alon, N., Barak, A., Manber, U.: On disseminating information reliably without broadcasting.In: Proceedings of the Seventh International Conference on Distributed Computing Systems,Berlin, September, pp. 74–81. IEEE Computer Society Press, New York (1987)

Alonso, R., Korth, F.: Database issues in nomadic computing. In: Proceedings of the ACM SIG-MOD International Conference on Mannagement of Data, Washington, DC, May 1993, pp.388–392 (1993)

Alvisi, L., Bressoud, T., El-Khasab, A., Marzullo, K., Zagorodnov, D.: Wrapping server-side TCPto mask connection failures. In: INFOCOMM 2001, Anchorage, Alaska, 22–26 April 2001,vol. 1, pp. 329–337 (2001a)

Alvisi, L., Malkhi, D., Pierce, E., Reiter, M.: Fault detection for byzantine quorum systems. IEEETrans. Parallel Distrib. Syst. 12(9), 996–1007 (2001b)

Amir, Y.: Replication using group communication over a partitioned network. Ph.D. diss., HebrewUniversity of Jerusalem (1995)

Amir, Y., Dolev, D., Kramer, S., Malkhi, D.: Membership algorithms in broadcast domains. In:Proceedings of the Sixth WDAG, Israel, June 1992. Lecture Notes in Computer Science,vol. 647, pp. 292–312. Springer, Berlin (1992a)

Amir, Y., Dolev, D., Kramer, S., Malkhi, D.: Transis: A communication subsystem for high avail-ability. In: Proceedings of the Twenty-Second Symposium on Fault-Tolerant Computing Sys-tems, Boston, July 1992, pp. 76–84. IEEE Computer Society Press, New York (1992b)

Amir, O., Amir, Y., Dolev, D.: A highly available application in the Transis environment. In: Pro-ceedings of the Workshop on Hardware and Software Architectures for Fault Tolerance. LectureNotes in Computer Science, vol. 774, pp. 125–139. Springer, Berlin (1994)

K.P. Birman, Guide to Reliable Distributed Systems, Texts in Computer Science,DOI 10.1007/978-1-4471-2416-0, © Springer-Verlag London Limited 2012

703

Page 2: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

704 References

Amir, Y., Moser, L.E., Melliar-Smith, P.M., Agarwal, D.A., Ciarfella, P.: The totem single-ringordering and membership protocol. Trans. Comput. Syst. 13(4), 311–342 (1995)

Amir, Y., Danilov, C., Stanton, J.: A low latency, loss tolerant architecture and protocol for widearea group communication. In: International Conference on Dependable Systems and Networks(DCCA-8), New York, June 25–28, 2000

Anceaume, E., Charron-Bost, B., Minet, P., Toueg, S.: On the formal specification of group mem-bership services. Technical Report 95-1534, Department of Computer Science, Cornell Univer-sity, August (1995)

Andersen, D., Balakrishnan, H., Kaashoek, M.F., Morris, R.: Resilient overlay networks. In: Pro-ceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII), SchlossElmau, Germany, May 2001a

Andersen, D., Balakrishnan, H., Kaashoek, M.F., Morris, R.: Resilient overlay networks. In: Pro-ceedings of the Symposium on Operating Systems Principles 17, Vancouver, CA, Oct. 2001,pp. 131–145 (2001b)

Anderson, D., Franklin, J., Kaminsky, M., Phanishayee, A., Tan, L., Vasudevan, V.: FAWN: A fastarray of wimpy nodes. In: Proc. 22nd ACM Symposium on Operating Systems Principles(SOSP), Big Sky, MT, October 2009

Anderson, T., et al.: Serverless network file systems. In: Proceedings of the Fifteenth Symposiumon Operating Systems Principles, Copper Mountain Resort, CO, December 1995, pp. 109–126.ACM Press, New York (1995). Also ACM Trans. Comput. Syst. 13(1) (1996)

Armand, F., Gien, M., Herrmann, F., Rozier, M.: Revolution 89, or distributing UNIX brings itback to its original virtues. Technical Report CS/TR-89-36-1, Chorus Systemes, Paris, France,August (1989)

Architecture Projects Management Limited: The advanced networked systems architecture: Anengineer’s introduction to the architecture. Technical Report TR-03-02, November (1989)

Architecture Projects Management Limited: The advanced networked systems architecture: A sys-tem designer’s introduction to the architecture. Technical Report RC-253-00, April (1991a)

Architecture Projects Management Limited: The advanced networked systems architecture: An ap-plication programmer’s introduction to the architecture. Technical Report TR-017-00, Novem-ber (1991b)

Attiya, H., Bar-Noy, A., Dolev, D.: Sharing memory robustly in message-passing systems. J. ACM42(1), 124–142 (1995)

Babaoglu, O., Marzullo, K.: Consistent global states of distributed systems: Fundamental conceptsand mechanisms. In: Mullender, S.J. (ed.) Distributed Systems, 2nd edn. Addison-Wesley/ACMPress, Reading (1993)

Babaoglu, O., Davoli, R., Giachini, L.A., Baker, M.B.: RELACS: A communications infrastructurefor constructing reliable applications in large-scale distributed systems. BROADCAST ProjectDeliverable Report, Department of Computing Science, University of Newcastle upon Tyne,United Kingdom (1994)

Babaoglu, O., Davoli, R., Montresor, A.: Failure detectors, group membership, and view-synchronous communication in partitionable asynchronous systems. Technical Report UBLCS-95-19, Department of Computer Science, University of Bologna, November (1995)

Babaoglu, O., Bartoli, A., Dini, G.: Enriched view synchrony: A paradigm for programming de-pendable applications in partitionable asynchronous distributed systems. Technical Report, De-partment of Computer Science, University of Bologna, May (1996)

Bailey, N.: The Mathematical Theory of Epidemic Diseases, 2nd edn. Charles Griffen and Com-pany, London (1975)

Baker, M.G., et al.: Measurements of a distributed file system. In: Proceedings of the ThirteenthACM Symposium on Operating Systems Principles, Orcas Island, WA, November 1991, pp.198–212 (1991)

Bal, H.E., Kaashoek, M.F., Tanenbaum, A.S.: Orca: A language for parallel programming of dis-tributed systems. IEEE Trans. Softw. Eng. 190–205 (1992)

Balakrishnan, H., Katz, R.H., Padmanbhan, V.N.: The effects of asymmetry on TCP performance.Mob. Netw. Appl. 4(3), 219–241 (1999)

Page 3: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 705

Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Looking up data in P2P sys-tems. Commun. ACM 46(2), 43–48 (2003)

Balakrishnan, M., Marian, T., Birman, K., Weatherspoon, H., Vollset, E.: Maelstrom: Transparenterror correction for lambda networks. In: NSDI 2008: Fifth Usenix Symposium on NetworkedSystems Design and Implementation, April 2008

Bartlett, J.F.: A nonstop kernel In: Proceedings of the Eighth ACM Symposium on OperatingSystems Principles, Pacific Grove, CA, December 1981, pp. 22–29. ACM Press, New York(1981)

Bartlett, J., Gray, J., Horst, B.: Fault tolerance in tandem computing systems. In: Evolution ofFault-Tolerant Computing, pp. 55–76. Springer, Berlin (1987)

Bellovin, S.M., Merritt, M.: Limitations of the Kerberos authentication system. Comput. Commun.Rev. 20(5), 119–132 (1990)

Ben-Or, M.: Fast asynchronous byzantine agreement. In: Proceedings of the Fourth ACM Sym-posium on Principles of Distributed Computing, Minaki, Canada, August 1985, pp. 149–151(1985)

Berners-Lee, T., et al.: The World Wide Web. Commun. ACM 37(8), 76–82 (1994)Berners-Lee, T., et al.: Hypertext Transfer Protocol—HTTP 1.0. IETF HTTP Working Group Draft

02 (Best Current Practice), August (1995)Bernstein, P.E., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database

Systems. Addison-Wesley, Reading (1987)Bershad, B., Anderson, T., Lazowska, E., Levy, H.: Lightweight remote procedure call. In:

Proceedings of the Eleventh ACM Symposium on Operating Systems Principles, LitchfieldSprings, AZ, December 1989, pp. 102–113 (1989). Also ACM Trans. Comput. Syst. 8(1), 37–55 (1990)

Bershad, B., et al.: Extensibility, safety, and performance in the SPIN operating system. In: Pro-ceedings of the Fifteenth Symposium on Operating Systems Principles, Copper Mountain Re-sort, CO, December 1995, pp. 267–284 (1995)

Bhagwan, R., Moore, D., Savage, S., Voelker, G.M.: Replication strategies for highly availablepeer-to-peer storage. In: Future Directions in Distributed Computing, pp. 153–158. Springer,Berlin (2003)

Bhide, A., Elnozahy, E.N., Morgan, S.P.: A highly available network file server. In: Proceedings ofthe USENIX Winter Conference, Austin, December 1991, pp. 199–205 (1991)

Birman, K.P.: Replication and availability in the ISIS system. In: Proc. of the 10th ACM Symp. onOperating Systems Principles, Orcas Island, WA, December 1985, pp. 79–86 (1985)

Birman, K.P.: A response to Cheriton and Skeen’s criticism of causal and totally ordered commu-nication. Oper. Syst. Rev. 28(1), 11–21 (1994)

Birman, K.P.: A review of experiences with reliable multicast. Softw. Pract. Exp. 29(9), 741–774(1999)

Birman, K.P.: The league of SuperNets. IEEE Internet Comput. 7(5), 93–96 (2003)Birman, K.P., Glade, B.B.: Consistent failure reporting in reliable communications systems. IEEE

Softw., Special Issue on Reliability (1995)Birman, K.P., Joseph, T.A.: Exploiting virtual synchrony in distributed systems. In: Proceedings of

the Eleventh Symposium on Operating Systems Principles, Austin, November 1987, pp. 123–138. ACM Press, New York (1987a)

Birman, K.P., Joseph, T.A.: Reliable communication in the presence of failures. ACM Trans. Com-put. Syst. 5(1), 47–76 (1987b)

Birman, K.P., van Renesse, R. (eds.): Reliable Distributed Computing with the Isis Toolkit. IEEEComputer Society Press, New York (1994)

Birman, K.P., van Renesse, R.: Software for reliable networks. Sci. Am. 274(5), 64–69 (1996)Birman, K.P., van Renesse, R.: A history of the virtual synchrony replication model. In: Charron-

Bost, B., Pedone, F., Schiper, A. (eds.) Replication: Theory and Practice. Chap. 6. LectureNotes in Computer Science, vol. 5959, pp. 91–120. Springer, Berlin (2010)

Birman, K.P., Schiper, A., Stephenson, P.: Lightweight causal and atomic group multicast. ACMTrans. Comput. Syst. 9(3), 272–314 (1991)

Page 4: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

706 References

Birman, K.P., Malkhi, D., Ricciardi, A., Schiper, A.: Uniform action in asynchronous distributedsystems. Technical Report TR 94-1447, Department of Computer Science, Cornell University(1994)

Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal multicast. ACMTrans. Comput. Syst. 17(2), 41–88 (1999)

Birman, K., Cantwell, J., Freedman, D., Huang, Q., Nikolov, P., Ostrowski, K.: Edge mashups forservice-oriented collaboration. IEEE Comput. 42(5) (2010)

Birman, K.P., Freedman, D.F., Huang, Q.: Overcoming CAP with consistent soft-state replication.IEEE Comput. Soc. Mag., special issue on the growing importance of the CAP conjecture,January/February 2012

Birrell, A.: Secure communication using remote procedure calls. ACM Trans. Comput. Syst. 3(1),1–14 (1985)

Birrell, A., Nelson, B., Implementing remote procedure call. ACM Trans. Program. Lang. Syst.2(1), 39–59 (1984)

Borg, A., Baumbach, J., Glazer, S.: A message system for supporting fault tolerance. In: Proceed-ings of the Ninth Symposium on Operating Systems Principles, Bretton Woods, NH, October1983, pp. 90–99 (1983)

Borg, A., et al.: Fault tolerance under UNIX. ACM Trans. Comput. Syst. 3(1), 1–23 (1985)Borr, A., Wilhelmy, C.: Highly available data services for UNIX client/server networks: Why

fault-tolerant hardware isn’t the answer. In: Banatre, M., Lee, P. (eds.) Hardware and SoftwareArchitectures for Fault Tolerance. Lecture Notes in Computer Science, vol. 774, pp. 385–404.Springer, Berlin (1994)

Braun, T., Diot, C.: Protocol implementation using integrated layer processing. In: Proceedings ofSIGCOMM-95, September 1995

Bressoud, T.C., Schneider, F.B.: Hypervisor-based fault tolerance. In: Proceedings of the FifteenthSymposium on Operating Systems Principles, Copper Mountain Resort, CO, December 1995,pp. 1–11. ACM Press, New York (1995). Also ACM Trans. Comput. Syst. 13(1) (1996)

Brewer, E.: Towards robust distributed systems. Keynote talk, ACM PODC (2000). Available ashttp://www.cs.berkeley.edu/~brewer/cs262b-2004/PODC-keynote.pdf

Brockschmidt, K.: Inside OLE-2. Microsoft Press, Redmond (1994)Broder, A.Z., Frieze, A.M., Upfal, E.: Static and dynamic path selection on expander graphs: A ran-

dom walk approach. J. Random Struct. Algorithms 14(1), 87–109 (1999)Budhiraja, N., et al.: The primary-backup approach. In: Mullender, S.J. (ed.) Distributed System,

2nd edn. Addison-Wesley/ACM Press, Reading (1993)Burrows, M.: The Chubby lock service for loosely-coupled distributed systems. In: Proceedings of

the 7th Symposium on Operating Systems Design and Implementation (OSDI ’06), pp. 335–350. USENIX Association, Berkeley (2006)

Bykov, S., Geller, A., Kliot, G., Larus, J., Pandya, R., Thelin, J.: Orleans: Cloud computing foreveryone. In: ACM Symposium on Cloud Computing (SOCC 2011), October 2011. ACM,New York (2011)

Carter, J.: Efficient distributed shared memory based on multi-protocol release consistency. Ph.D.diss., Rice University, August (1993)

Carzaniga, A., Rosenblum, D., Wolf, A.: Design and evaluation of a wide-area event notificationservice. ACM Trans. Comput. Syst. 19(3) (2001)

Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans.Comput. Syst. 20(4), 398–461 (2002)

Castro, M., Druschel, P., Hu, Y.C., Rowstron, A.: Topology-aware routing in structured peer-to-peer overlay networks. In: Future Directions in Distributed Computing 2003, pp. 103–107.Springer, Berlin (2003a)

Castro, M., Rodrigues, R., Liskov, B.: BASE: Using abstraction to improve fault tolerance. ACMTrans. Comput. Syst. 21(3), 236–269 (2003b)

Chandra, T., Toueg, S.: Time and message efficient reliable broadcasts. Technical Report TR 90-1094, Department of Computer Science, Cornell University, February (1990)

Page 5: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 707

Chandra, T., Toueg, S.: Unreliable failure detectors for asynchronous systems. J. ACM (in press).Previous version in ACM Symposium on Principles of Distributed Computing (Montreal,1991), pp. 325–340

Chandra, T., Hadzilacos, V., Toueg, S.: The weakest failure detector for solving consensus. In:ACM Symposium on Principles of Distributed Computing, August 1992, pp. 147–158 (1992)

Chandra, T., Hadzilacos, V., Toueg, S., Charron-Bost, B.: On the impossibility of group member-ship. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, Van-couver, May 1996

Chandy, K.M., Lamport, L.: Distributed snapshots: Determining global states of distributed sys-tems. ACM Trans. Comput. Syst. 3(1), 63–75 (1985)

Chang, M., Maxemchuk, N.: Reliable broadcast protocols. ACM Trans. Comput. Syst. 2(3), 251–273 (1984)

Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes,A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. ACM Trans. Com-put. Syst. 26(2), 4 (2008), 26 pages

Charron-Bost, B.: Concerning the size of logical clocks in distributed systems. Inf. Process. Lett.39(1), 11–16 (1991)

Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun.ACM 24(2), 84–88 (1981)

Cheriton, D., Skeen, D.: Understanding the limitations of causally and totally ordered communi-cation. In: Proceedings of the Thirteenth ACM Symposium on Operating Systems Principles,Asheville, NC, December 1993, pp. 44–57. ACM Press, New York (1993)

Chilaragee, R.: Top five challenges facing the practice of fault tolerance. In: Banatre, M., Lee, P.(eds.) Hardware and Software Architectures for Fault Tolerance. Lecture Notes in ComputerScience, vol. 774, pp. 3–12. Springer, Berlin (1994)

Cho, K., Birman, K.P.: A group communication approach for mobile computing. Technical ReportTR94-1424, Department of Computer Science, Cornell University, May (1994)

Chockler, G., Keidar, I., Vitenberg, R.: Group communication specifications: A comprehensivestudy. ACM Comput. Surv. 33(4), 1–43 (2001)

Chockler, G., Gilbert, S., Gramoli, V.C., Musial, P.M., Shvartsman, A.A.: Reconfigurable dis-tributed storage for dynamic networks. In: 9th International Conference on Principles of Dis-tributed Systems (OPODIS’05), December 2005

Chockler, G., Laden, G., Vigfusson, Y.: Design and implementation of caching services in thecloud. IBM J. Res. Dev. (2011, to appear). Special Issue on Cloud Computing

Clark, D., Tennenhouse, M.: Architectural considerations for a new generation of protocols. In:Proceedings of SIGCOMM-87, August 1987, pp. 353–359 (1987)

Clark, D., Tennenhouse, D.L.: Architectural considerations for a new generation of protocols. In:Proceedings of the 1990 Symposium on Communication Architectures and Protocols, Philadel-phia, September 1990, pp. 200–208. ACM Press, New York (1990)

Clark, D., Jacobson, V., Romkey, J., Salwen, H.: An analysis of TCP processing overhead. IEEECommun. 27(6), 23–29 (1989)

Clarke, R., Knake, R.: Cyber War: The Next Threat to National Security and What to Do About It.HarperCollins e-books (April 20, 2010)

Clegg, M., Marzullo, K.: Clock synchronization in hard real-time distributed systems. TechnicalReport, Department of Computer Science, University of California, San Diego, March (1996)

Coan, B., Thomas, G.: Agreeing on a leader in real time. In: Proceedings of the Eleventh Real-TimeSystems Symposium, December 1990, pp. 166–172 (1990)

Coan, B., Oki, B.M., Kolodner, E.K.: Limitations on database availability when networks parti-tion. In: Proceedings of the Fifth ACM Symposium on Principles of Distributed Computing,Calgary, August 1986, pp. 187–194 (1986)

Comer, D.E.: Internetworking with TCP/IP. Principles, Protocols, and Architecture, vol. I. PrenticeHall, Englewood Cliffs (1991)

Comer, D.E., Stevens, D.L.: Internetworking with TCP/IP. Design, Implementation, and Internals,vol. II. Prentice Hall, Englewood Cliffs (1991)

Page 6: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

708 References

Comer, D.E., Stevens, D.L.: Internetworking with TCP/IP. Client/Server Programming and Appli-cations, vol. III. Prentice Hall, Englewood Cliffs (1993)

Cooper, E.: Replicated distributed programs. In: Proceedings of the Tenth ACM Symposium onOperating Systems Principles, Orcas Island, WA, December 1985, pp. 63–78. ACM Press, NewYork (1985)

Cooper, R.: Experience with causally and totally ordered group communication support—A cau-tionary tale. Oper. Syst. Rev. 28(1), 28–32 (1994)

Cooper, D.A., Birman, K.P.: The design and implementation of a private message service for mo-bile computers. Wirel. Netw. 1(3), 297–309 (1995)

Cooper, B.F., Ramakrishnan, R., Srivastava, U., Silberstein, A., Bohannon, P., Jacobsen, H.A.,Puz, N., Weaver, D., Yerneni, R.: PNUTS: Yahoo!’s hosted data serving platform. In: Proc.34th VLDB, August 2008, vol. 1, 2, pp. 1277–1288 (2008)

Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design. Addison-Wesley, Reading (1994)

Cristian, F.: Probabilistic clock synchronization. Distrib. Comput. 3(3), 146–158 (1989)Cristian, F.: Reaching agreement on processor group membership in synchronous distributed sys-

tems. Distrib. Comput. 4(4), 175–187 (1991a)Cristian, F.: Understanding fault-tolerant distributed systems. Commun. ACM 34(2), 57–78

(1991b)Cristian, F.: Synchronous and asynchronous group communication. Commun. ACM 39(4), 88–97

(1996)Cristian, F., Delancy, R.: Fault tolerance in the advanced automation system. IBM Technical Report

RJ7424, IBM Research Laboratories, San Jose, CA, April (1990)Cristian, F., Fetzer, C.: Fault-tolerant internal clock synchronization. In: Proceedings of the Thir-

teenth Symposium on Reliable Distributed Systems, October 1994Cristian, F., Schmuck, F.: Agreeing on process group membership in asynchronous distributed

systems. Technical Report CSE95-428, Department of Computer Science and Engineering,University of California, San Diego (1995)

Cristian, F., Aghili, H., Strong, R., Dolev, D.: Atomic broadcast: From simple message diffusionto byzantine agreement. In: Proceedings of the Fifteenth International Symposium on Fault-Tolerant Computing, pp. 200–206. IEEE Computer Society Press, New York (1985). Revisedas IBM Technical Report RJ5244

Cristian, F., Dolev, D., Strong, R., Aghili, H.: Atomic broadcast in a real-time environment. In:Fault-Tolerant Distributed Computing. Lecture Notes in Computer Science, vol. 448, pp. 51–71. Springer, Berlin (1990)

Dabek, F., Cox, R., Kaashoek, F., Morris, R.: Vivaldi: A decentralized network coordinate system.In: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Pro-tocols for Computer Communications (SIGCOMM ’04), pp. 15–26. ACM, New York (2004)

Damm, A., Reisinger, J., Schwabl, W., Kopetz, H.: The real-time operating system of mars. ACMOper. Syst. Rev. 22(3), 141–157 (1989)

Davidson, S., Garcia-Molina, H., Skeen, D.: Consistency in a partitioned network: A survey. ACMComput. Surv. 17(3), 341–370 (1985)

Deering, S.E.: Multicast routing in internetworks and extended LANs. Comput. Commun. Rev.18(4), 55–64 (1988)

Demers, A., et al.: Epidemic algorithms for replicated data management. In: Proceedings of theSixth Symposium on Principles of Distributed Computing, Vancouver, August 1987, pp. 1–12(1987). Also Oper. Syst. Rev. 22(1), 8–32 (1988)

Denning, D.: Digital signatures with RSA and other public-key cryptosystems. Commun. ACM27(4), 388–392 (1984)

Denning, D., Branstad, D.A.: Taxonomy for key escrow encryption systems. Commun. ACM39(3), 34–40 (1996)

Desmedt, Y.: Society and group-oriented cryptography: A new concept. In: Advances inCryptology—CRYPTO’87 Proceedings. Lecture Notes in Computer Science, vol. 293,pp. 120–127. Springer, Berlin (1988)

Page 7: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 709

Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver/multi-sender network security: Efficient au-thenticated multicast/feedback. In: Proceedings of the IEEE INFOCOM, May 1992

Diffie, W., Hellman, M.E.: Privacy and authentication: An introduction to cryptography. Proc.IEEE 673, 397–427 (1979)

Diffie, W., Landau, S.: Privacy on the Line: The Politics of Wiretapping and Encryption. MITPress, Cambridge (2007). Updated and expanded edition. ISBN-10: 0262042401

Digital Equipment Corporation: A technical description of the DECsafe available server environ-ment (ASE). Digit. Tech. J. 7(4), 89–100 (1995)

Dolev, S.: Self-stabilization. MIT Press, Cambridge (2000)Dolev, D., Malkhi, D.: The Transis approach to high availability cluster communication. Commun.

ACM 39(4), 64–70 (1996)Dolev, D., Malkhi, D., Strong, R.: A framework for partitionable membership service. Technical

Report TR 95-4, Institute of Computer Science, Hebrew University of Jerusalem, March (1995)Drushel, P., Peterson, L.L.: Fbufs: A high-bandwidth cross-domain transfer facility. In: Proceed-

ings of the Thirteenth ACM Symposium on Operating Systems Principles, Pacific Grove, CA,December 1993, pp. 189–202. ACM Press, New York (1993)

Ekwall, R., Urbán, P., Schiper, A.: Robust TCP connections for fault tolerant computing. In: Pro-ceedings of the 9th International Conference on Parallel and Distributed Systems (ICPDS),Taiwan ROC, Dec. 2002

Engler, D.R., Kaashoek, M.F., O’Toole, J.: Exokernel: An operating system architecture forapplication-level resource management. In: Proceedings of the Fifteenth Symposium on Op-erating Systems Principles, Copper Mountain Resort, CO, December 1995, pp. 251–266. ACMPress, New York (1995)

Eugster, P., Guerraoui, R., Handurukande, S.B., Kouznetsov, P., Kermarrec, A.-M.: Lightweightprobabilistic broadcast. ACM Trans. Comput. Syst. 21(4), 341–374 (2003)

Feeley, M., et al.: Implementing global memory management in a workstation cluster. In: Pro-ceedings of the Fifteenth ACM SIGOPS Symposium on Operating Systems Principles, CopperMountain Resort, CO, December 1995, pp. 201–212 (1995)

Fekete, A., Lynch, N., Shvartsman, A.: Specifying and using a partitionable group communicationservice. ACM Trans. Comput. Syst. 19(2), 171–216 (2001)

Felton, E., Zahorjan, J.: Issues in the implementation of a remote memory paging system. TechnicalReport 91-03-09, Department of Computer Science and Engineering, University of Washing-ton, March (1991)

Fidge, C.: Timestamps in message-passing systems that preserve the partial ordering. In: Proceed-ings of the Eleventh Australian Computer Science Conference (1988)

Fisher, M.J., Lynch, N.A., Merritt, M.: Easy impossibility proofs for distributed consensus prob-lems. In: Proceedings of the Fourth Annual ACM Symposium on Principles of DistributedComputing, Minaki, Canada, August 1985. ACM Press, New York (1985a)

Fisher, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed computing with one faultyprocess. J. ACM 32(2), 374–382 (1985b)

Frankel, Y.: A practical protocol for large group-oriented networks. In: Advances in Cryptology—EUROCRYPT ’89. Lecture Notes in Computer Science, vol. 434, pp. 56–61. Springer, Berlin(1989)

Frankel, Y., Desmedt, Y.: Distributed reliable threshold multisignature. Technical Report TR-92-0402, Department of EECS, University of Wisconsin, Milwaukee, June (1992)

Freedman, D., Marian, T., Lee, J.H., Birman, K., Weatherspoon, H., Xu, C.: Exact temporal charac-terization of 10 Gbps optical wide-area network. In: Proceedings of the 10th ACM SIGCOMMInternet Measurement Conference (IMC), Melbourne, Australia, November 2010

Friedman, R.: Consistency conditions for distributed shared memories. Ph.D. thesis, Technion(1994)

Friedman, R., Birman, K.P.: Using group communication technology to implement a reliable andscalable distributed IN coprocessor. In: TINA’96: The Convergence of Telecommunications andDistributed Computing Technologies, Heidelberg, September 1996, pp. 25–42. VDE-Verlag,Berlin (1996). Also Technical Report, Department of Computer Science, Cornell University,March (1996)

Page 8: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

710 References

Friedman, R., van Renesse, R.: Strong and weak virtual synchrony in Horus. Technical Report95-1537, Department of Computer Science, Cornell University, August (1995a)

Friedman, R., van Renesse, R.: Packing messages as a tool for boosting the performance of to-tal ordering protocols. Technical Report 95-1527, Department of Computer Science, CornellUniversity, July (1995b). IEEE Trans. Netw. (submitted)

Friedman, R., Keider, I., Malkhi, D., Birman, K.P., Dolev, D.: Deciding in partitionable net-works. Technical Report 95-1554, Department of Computer Science, Cornell University, Octo-ber (1995)

Ganger, G., McKusick, M., Soules, C., Patt, Y.: Soft updates: A solution to the metadata updateproblem in file systems. ACM Trans. Comput. Syst. 18(2), 127–153 (2000)

Garbinato, B., Guerraoui, R.: Using the strategy pattern to compose reliable distributed protocols.In: Proceedings of 3rd USENIX COOTS, Portland, Oregon, June 1997

Gharachorloo, K., et al.: Memory consistency and event ordering in scalable shared-memory multi-processors. In: Proceedings of the Seventeenth Annual International Symposium on ComputerArchitecture, Seattle, May 1990, pp. 15–26 (1990)

Ghemawat, S., Gobioff, H., Leung, S.T.: File and storage systems: The Google file system. In: 19thACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October2003

Gibbs, B.W.: Software’s chronic crisis. Sci. Am. (1994)Gifford, D.: Weighted voting for replicated data. In: Proceedings of the Seventh ACM Sympo-

sium on Operating Systems Principles, Pacific Grove, CA, December 1979, pp. 150–162. ACMPress, New York (1979)

Gilbert, S., Lynch, N.: Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM PODC (2002), published as ACM SIGACT News 33(2), 51–59(2002)

Gilbert, S., Lynch, N., Shvartsman, A.: Rambo II: Rapidly reconfigurable atomic memory for dy-namic networks. In: Proc. of the 17th Intl. Symp. on Distributed Computing (DISC), June 2003,pp. 259–268 (2003)

Glade, B.B., Birman, K.P., Cooper, R.C., van Renesse, R.: Lightweight process groups in the Isissystem. Distrib. Syst. Eng. J. (1993)

Golding, R.A.: Distributed epidemic algorithms for replicated tuple spaces. Technical Report HPL-CSP-91-15, June (1991). Concurrent systems project, Hewlett-Packard Laboratories

Golding, R.A.: Weak consistency group communication and membership. Ph.D. diss., Computerand Information Sciences Department, University of California, Santa Cruz (1992)

Golding, R., Taylor, K.: Group membership in the epidemic style. Technical Report UCSC-CRL-92-13, University of California, Santa Cruz, May (1992)

Gong, L.: Securely replicating authentication services. In: Proceedings of the Ninth InternationalConference on Distributed Computing Systems, August 1989, pp. 85–91 (1989)

Gopal, A., Strong, R., Toueg, S., Cristian, F.: Early-delivery atomic broadcast. In: Proceedings ofthe Ninth ACM Symposium on Principles of Distributed Computing, Toronto, August 1990,pp. 297–309. ACM Press, New York (1990)

Gosling, J., McGilton, H.: The Java language environment: A white paper. Sun Microsystems, Inc.,October (1995a). Available as http://java.sun.com/langEnv/index.html

Gosling, J., McGilton, H.: The Java programmer’s guide: A white paper. Sun Microsystems, Inc.,October (1995b). Available as http://java.sun.com/progGuide/index.html

Govindran, R., Anderson, D.P.: Scheduling and IPC mechanisms for continuous media. In: Pro-ceedings of the Twelfth ACM Symposium on Operating Systems Principles, Asilomar, CA,October 1991, pp. 68–80. ACM Press, New York (1991)

Gramoli, V., Vigfusson, Y., Birman, K., Kermarrec, A.-M., van Renesse, R.: Slicing distributedsystems. IEEE Trans. Comput. 58(11), 1444–1455 (2009)

Gray, J.: Notes on database operating systems. In: Operating Systems: An Advanced Course. Lec-ture Notes in Computer Science, vol. 60, pp. 393–481. Springer, Berlin (1978)

Gray, J.: A census of tandem system availability between 1985 and 1990. Technical Report 90.1,Tandem Computer Corporation, September (1990)

Page 9: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 711

Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann, SanMateo (1993)

Gray, J., Bartlett, J., Horst, R.: Fault tolerance in tandem computer systems. In: Avizienis, A.,Kopetz, H., Laprie, J.C. (eds.) The Evolution of Fault-Tolerant Computing. Springer, Berlin(1987)

Gray, J., Helland, P., Shasha, D.: Dangers of replication and a solution. In: ACM SIGMOD Inter-national Conference on Management of Data, Montreal, Quebec, Canada, June 1996

Gribble, S., et al.: The Ninja architecture for robust Internet-scale systems and services. Comput.Netw. 35(4), 473–497 (2001)

Guerraoui, R.: Revisiting the relationship between nonblocking atomic commitment and con-sensus. In: International Workshop on Distributed Algorithms, September 1995, pp. 87–100(1995)

Guerraoui, R., Schiper, A.: Gamma-accurate failure detectors. Technical Report APFL, Lausanne,Switzerland: Départment d’Informatique (1996)

Guerraoui, G., Felber, P., Garbinato, B., Mazouni, K.: System support for object groups. In: OOP-SLA ’98: Proceedings of the 13th ACM SIGPLAN Conference on Object-oriented Program-ming, Systems, Languages, and Applications, October 1998

Guerraoui, R., Kneževic, N., Quéma, V., Vukolic, M.: The next 700 BFT protocols. In: Proceedingsof EuroSys, Paris, France, April 2010, pp. 363–376 (2010)

Gupta, I., Birman, K.P., Linga, P., Demers, A., van Renesse, R.: Kelips: Building an efficient andstable P2P DHT through increased memory and background overhead. In: Proc. 2nd Interna-tional Workshop on Peer-to-Peer Systems (IPTPS ’03), Oakland, CA (2003)

Gurwitz, R.F., Dean, M., Schantz, R.E.: Programming support in the Chronus distributed operat-ing system. In: Proceedings of the Sixth International Conference on Distributed ComputingSystems, pp. 486–493. IEEE Computer Society Press, New York (1986)

Haeberlen, A., Kuznetsov, P., Druschel, P.: PeerReview: Practical accountability for distributedsystems. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP’07), Stevenson, WA, October 2007

Hagmann, R.: Reimplementing the cedar file system using logging and group commit. In: Proceed-ings of the Eleventh ACM Symposium on Operating Systems Principles, Austin, November1987, pp. 155–171. ACM Press, New York (1987)

Hall, R., Mathur, A., Jahanian, F., Prakash, A., Rassmussen, C.: Corona: A communication servicefor scalable, reliable group collaboration systems. In: Ackerman, M.S. (ed.) Proceedings ofthe ACM Conference on Computer Supported Cooperative Work (CSCW ’96), pp. 140–149.ACM, New York (1996)

Halpern, J.Y., Moses, Y.: Knowledge and common knowledge in a distributed environment. J.ACM 37(3), 549–587 (1990)

Hartman, J.H., Ousterhout, J.K.: The Zebra striped network file system. In: Proceedings of theThirteenth ACM Symposium on Operating Systems Principles, Asheville, NC, December 1993,pp. 29–43. ACM Press, New York (1993)

Heidemann, J., Popek, G.: File system development with stackable layers. Commun. ACM 12(1),58–89 (1994)

Heidemann, J., Popek, G.: Performance of cache coherence in stackable filing. In: Proceedingsof the Fifteenth ACM Symposium on Operating Systems Principles, Copper Mountain Resort,CO, December 1995, pp. 127–142 (1995)

Herlihy, M.: A quorum-consensus replication method for abstract data types. ACM Trans. Comput.Syst. 4(1), 32–53 (1986)

Herlihy, M.P., Tygar, J.D.: How to make replicated data secure. In: Advances in Cryptography—CRYPTO’87 Proceedings. Lecture Notes in Computer Science, vol. 293, pp. 379–391.Springer, Berlin (1987)

Herlihy, M., Wing, J.: Linearizability: A correctness condition for concurrent objects. ACM Trans.Program. Lang. Syst. 12(3), 463–492 (1990)

Hildebrand, D.: An architectural overview of QNX. In: Proceedings of the First USENIX Work-shop on Microkernels and Other Kernel Architectures, Seattle, April 1992, pp. 113–126 (1992)

Page 10: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

712 References

Holliday, J., Agrawal, D., El Abbadi, A.: The performance of database replication with groupmulticast. In: FTCS 1999, pp. 158–165 (1999)

Holliday, J., Agrawal, D., El Abbadi, A.: Partial database replication using epidemic communica-tion. In: ICDCS 2002, p. 485 (2002)

Hoory, S., Linial, N., Widgerson, A.: Expander graphs and their applications. Bull. Am. Math. Soc.43(4), 439–561 (2006). doi:10.1090/S0273-0979-06-01126-8

Howard, J., et al.: Scale and performance in a distributed file system. In: Proceedings of theEleventh ACM Symposium on Operating Systems Principles, Austin, November 1987. ACMPress, New York (1987). Also ACM Trans. Comput. Syst. 5(1) (1988)

Huang, Q., Birman, K., Vigfusson, Y., Li, H.: Quilt: A patchwork of multicast regions. In: 4thACM International Conference on Distributed Event-Based Systems (DEBS2010), Cambridge,United Kingdom, July 2010

Hunker, J.: Creeping Failure: How We Broke the Internet and What We Can Do to Fix It. McClel-land and Stewart, Toronto (2011). Reprint edition (September 27). ISBN-10: 0771040245

Hunt, G.D.: Multicast flow control on local area networks. Ph.D. diss., Department of ComputerScience, Cornell University, February (1995). Also available as Technical Report TR-95-1479

Iyer, S., Rowstron, A., Druschel, P.: Squirrel: A decentralized peer-to-peer web cache. In: Princi-ples of Distributed Computing (PODC), pp. 213–222 (2002)

Jacobson, V.: Congestion avoidance and control. In: Proceedings of the ACM SIGCOMM ’88,Palo Alto (1988)

Jacobson, V.: Compressing TCP/IP headers for low-speed serial links. Technical Report RFC 114,Network Working Group, February (1990)

Jelasity, M., Babaoglu, O.: T-Man: Gossip-based overlay topology management. In: EuropeanWorkshop on Engineering Self-organising Systems, pp. 1–15 (2005)

Jelasity, M., Voulgaris, S., Guerraoui, R., Kermarrec, A.M., van Steen, M.: Gossip-based peersampling. Trans. Comput. Syst. 25(3) (2007)

Jelasity, M., Montresor, A., Babaoglu, O.: T-Man: Gossip-based fast overlay topology construc-tion. Comput. Netw. 53(13) (2009)

Johansen, H., Allavena, A., van Renesse, R.: An introduction to the TACOMA distributed system(Version 1.0). Computer Science Technical Report 95-23, University of Tromsö, June (1995a)

Johansen, H., Allavena, A., van Renesse, R.: Fireflies: Scalable support for intrusion-tolerant net-work overlays. In: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference onComputer Systems 2006 (EuroSys ’06), pp. 3–13. ACM, New York (2006)

Johnson, K., Kaashoek, M.F., Wallach, D.: CRL: High-performance all software distributed sharedmemory. In: Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles,Copper Mountain Resort, CO, December 1995, pp. 213–228 (1995)

Jones, M.B.: Interposition agents: Transparent interposing user code at the system interface. In:Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, Asheville,NC, December 1993, pp. 80–93. ACM Press, New York (1993)

Joseph, T.A.: Low cost management of replicated data. Ph.D. diss., Cornell University (1986). AlsoTechnical Report, Department of Computer Science, Cornell University

Joseph, A., de Lespinasse, A., Tauber, J., Gifford, D., Kaashoek, F.K.: Rover: A toolkit for mobileinformation access. In: 15th ACM Symposium on Operating Systems (SOSP), Copper Moun-tain, CO, December 1995

Junqueira, F., Reed, B.: The life and times of a ZooKeeper. In: ACM Symposium on ParallelAlgorithms and Architectures (SPAA) (2009). Also published as a “brief announcement” in theSymposium on Principles of Distributed Computing (PODC)

Junqueira, F., Hunt, P., Konar, M., Reed, B.: The ZooKeeper coordination service (poster). In:Symposium on Operating Systems Principles (SOSP) (2009)

Kaashoek, F.: Group communication in distributed computer systems. Ph.D. diss., Vrije Univer-siteit (1992)

Kalantar, M.: Issues in ordered multicast performance: A simulation study. Ph.D. diss., Departmentof Computer Science, Cornell University, August (1995). Also Technical Report TR-95-1531

Page 11: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 713

Karamcheti, V., Chien, A.A.: Software overhead in messaging layers: Where does the time go?In: Proceedings of the Sixth ACM Symposium on Principles of Programming Languages andOperating Systems, San Jose, CA, October 1994. ACM Press, New York (1994)

Kay, J., Pasquale, J.: The importance of nondata touching processing overheads. In: Proceedingsof SIGCOMM-93, August 1993, pp. 259–269 (1993)

Keidar, I.: Consistency and high availability of information dissemination in multi-processor net-works. Ph.D. thesis, Hebrew University of Jerusalem, October (1998)

Keidar, I.: Challenges in evaluating distributed algorithms. In: Future Directions in DistributedComputing. Lecture Notes in Computer Science, vol. 2584, pp. 40–44 (2010)

Keidar, I., Dolev, D.: Increasing the resilience of atomic commit at no additional cost. In: Proceed-ings of the 1995 ACM Symposium on Principles of Database Systems, May 1995, pp. 245–254(1995)

Keidar, I., Dolev, D.: Totally ordered broadcast in the face of network partitions. Exploiting groupcommunication for replication in partitionable networks. In: Avresky, D. (ed.) Dependable Net-work Computing, pp. 51–75. Kluwer Academic, Dordrecht (2000). Chap. 3

Keidar, I., Khazan, R.: A virtually synchronous group multicast algorithm for WANs: Formal ap-proach. SIAM J. Comput. 32(1), 78–130 (2002)

Keidar, I., Khazan, R., Lynch, N., Shvartsman, A.: An inheritance-based technique for buildingsimulation proofs incrementally. ACM Trans. Softw. Eng. Methodol. 11(1), 63–91 (2002a)

Keidar, I., Sussman, J., Marzullo, K., Dolev, D.: Moshe: A group membership service for wans.ACM Trans. Comput. Syst. 20(3), 1–48 (2002b)

Kermarrec, A.M., Rowstron, A., Shapiro, M., Druschel, P.: The IceCube approach to the reconcil-iation of divergent replicas. In: Principles of Distributed Computing, pp. 210–218 (2001)

Kermarrec, A.M., Pace, A., Quéma, V., Schiavoni, V.: NAT-resilient gossip peer sampling. In: Pro-ceedings of the International Conference on Distributed Computing Systems (ICDCS), Mon-treal, Canada, June 2009, pp. 360–367 (2009)

Kistler, J.J., Satyanarayanan, M.: Disconnected operation in the Coda file system. ACM Trans.Comput. Syst. 10(1), 3–25 (1992)

Kleinberg, J.: Navigation in a small world. Nature 406, 845 (2000a)Kleinberg, J.: The small-world phenomenon: An algorithmic perspective. In: Proc. 32nd ACM

Symposium on Theory of Computing (2000b). Also appears as Cornell Computer ScienceTechnical Report 99-1776 (October 1999)

Kleinberg, J.: Small-world phenomena and the dynamics of information. Adv. Neural Inf. Process.Syst. 14 (2001)

Kleinberg, J.: The small-world phenomenon and decentralized search. A short essay as part ofMath Awareness Month 2004. SIAM News 37(3) (2004)

Kopetz, H., Ochsenreiter, W.: Clock synchronization in distributed real-time systems. IEEE Trans.Comput. C36(8), 933–940 (1987)

Kopetz, H., Verissimo, P.: Real-time dependability concepts. In: Mullender, S.J. (ed.) DistributedSystems, 2nd edn., pp. 411–446. Addison-Wesley/ACM Press, Reading (1993)

Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: Speculative byzantine faulttolerance. ACM Trans. Comput. Syst. 27(4) (2009)

Kronenberg, N., Levy, H., Strecker, W.: VAXClusters: A closely-coupled distributed system. In:Proceedings of the Tenth ACM Symposium on Operating Systems Principles, Orcas Island,WA, December 1985. Also ACM Trans. Comput. Syst. 4(2), 130–146 (1986)

Kubiatowicz, J.: Extracting guarantees from chaos. Commun. ACM 46(2), 33–38 (2003)Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S.,

Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An architecture for global-scale persistent storage. In: Proceedings of ACM, ASPLOS (2000a)

Kubiatowicz, J., et al.: OceanStore: An architecture for global-scale persistent storage. In: Pro-ceedings of Architectural Support for Programming Languages and Systems (ASPLOS), pp.190–201 (2000b)

Ladin, R., Liskov, B., Shrira, L., Ghemawat, S.: Lazy replication: Exploiting the semantics ofdistributed services. In: Proceedings of the Tenth ACM Symposium on Principles of DistributedComputing, Quebec, August 1990, pp. 43–58. ACM Press, New York (1990)

Page 12: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

714 References

Ladin, R., Liskov, B., Shrira, L., Ghemawat, S.: Providing availability using lazy replication. ACMTrans. Comput. Syst. 10(4), 360–391 (1992)

Laih, C.S., Harn, L.: Generalized threshold cryptosystems. In: Proceedings of ASIACRYPT ’91(1991)

Lakshman, A., Malik, P.: Cassandra: A structured storage system on a P2P network. In: Proceed-ings of the Twenty-First Annual Symposium on Parallelism in Algorithms and Architectures(SPAA ’09), pp. 47. ACM, New York (2009)

Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM21(7), 558–565 (1978a)

Lamport, L.: The implementation of reliable distributed multiprocess systems. Comput. Netw. 2,95–114 (1978b)

Lamport, L.: Using time instead of timeout for fault-tolerant distributed systems. ACM Trans.Program. Lang. Syst. 6(2), 254–280 (1984)

Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. 16, 133–169 (1998)Lamport, L.: Paxos made simple. Distrib. Comput. Column ACM SIGACT News 32(4), 51–58

(2001)Lamport, L., Melliar-Smith, P.M.: Synchronizing clocks in the presence of faults. J. ACM 32(1),

52–78 (1985)Lamport, L., Malkhi, D., Zhou, L.: Vertical Paxos and primary-backup replication. In: Proceedings

of the 28th ACM Symposium on Principles of Distributed Computing (PODC’09), pp. 312–313(2009a)

Lamport, L., Malkhi, D., Zhou, L.: Reconfiguring a state machine. Technical report, MicrosoftResearch (2009b)

Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theoryand practice. ACM Trans. Comput. Syst. 10(4), 265–434 (1992)

Lee, E., Seshia, S.: Introduction to Embedded Systems, A Cyber-Physical Systems Approach.http://LeeSeshia.org. ISBN 978-0-557-70857-4 (2011)

Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, New York (1999).ISBN 046503912X

Leveson, N.: Safeware: System safety and computers. Addison-Wesley, Reading (1995)Li, K., Hudak, P.: Memory coherence in a shared virtual memory system. ACM Trans. Comput.

Syst. 7(4), 321–359 (1989)Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework.

In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002, pp. 114–130. IEEE Computer Society Press, Los Alamitos (2002)

Liskov, B.: Practical uses of synchronized clocks in distributed systems. Distrib. Comput. 6(4),211–219 (1993)

Liskov, B., Scheifler, R.: Guardians actions: Linguist support for robust, distributed programs.ACM Trans. Program. Lang. Syst. 5(3), 381–404 (1983)

Liskov, B., Curtis, D., Johnson, P., Scheifler, R.: Implementation of Argus. In: Proceedings ofthe Eleventh ACM Symposium on Operating Systems Principles, Austin, November 1987, pp.111–122. ACM Press, New York (1987)

Liskov, B., et al.: Replication in the Harp file system. In: Proceedings of the Twelfth ACM Sympo-sium on Operating Systems Principles, Asilomar, CA, October 1991, pp. 226–238. ACM Press,New York (1991)

Liu, X.: Evaluation of the virtual interface architecture (VIA). Tech Report, UCSD, June (1998)Liu, X., Kreitz, C., van Renesse, R., Hickey, J., Hayden, M., Birman, K.P., Constable, R.: Building

reliable, high-performance communication systems from components. In: Proc. of the 17thACM Symposium on Operating System Principles, Kiawah Island Resort, SC, December 1999

Lorch, J.R., Adya, A., Bolosky, W.J., Chaiken, R., Douceur, J.R., Howell, J.: The SMART way tomigrate replicated stateful services. In: Proc. of the 1st Eurosys Conference, Leuven, Belgium,April 2006, pp. 103–115 (2006)

Lynch, N.: Distributed Algorithms. Morgan Kaufmann, San Mateo (1996)

Page 13: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 715

Lynch, N., Shvartsman, A.A.: RAMBO: A reconfigurable atomic memory service for dynamicnetworks. In: Proc. of the 16th International Symposium on Distributed Computing, Toulouse,France, October 2002, pp. 173–190 (2002)

MacCormick, J., Murphy, N., Najork, M., Thekkath, C.A., Zhou, L.: Boxwood: Abstractions asthe foundation for storage infrastructure. In: Symposium on Operating System Design andImplementation (OSDI), pp. 105–120. USENIX, Berkeley (2004)

Macedo, R.A., Ezhilchlvan, P., Shrivastava, S.: Newtop: A total order multicast protocol usingcausal blocks. BROADCAST Project Technical Reports, vol. I, Department of Computer Sci-ence, University of Newcastle upon Tyne, October (1993)

Maffeis, S.: Adding group communication and fault tolerance to CORBA. In: Proceedings of the1995 USENIX Conference on Object-Oriented Technologies, Monterey, CA, June 1995

Malkhi, D.: Multicast communication for high availability. Ph.D. diss., Hebrew University ofJerusalem (1994)

Malkhi, D., Reiter, M.K.: Byzantine quorum systems. Distrib. Comput. 11(4), 203–213 (1998)Malkhi, D., Reiter, M.K.: An architecture for survivable coordination in large distributed systems.

IEEE Trans. Knowl. Data Eng. 12(2), 187–202 (2000)Malkhi, D., Reiter, M., Wool, A., Wright, R.: Probabilistic quorum systems. Inf. Comput. J. 170(2)

(2001a)Malkhi, D., Reiter, M.K., Tulone, D., Ziskind, E.: Persistent objects in the Fleet system. In: Pro-

ceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEXII), June 2001, vol. II, pp. 126–136 (2001b)

Malloth, C.: Conception and implementation of a toolkit for building fault-tolerant distributed ap-plications in large-scale networks. Ph.D. diss., Swiss Federal Institute of Technology, Lausanne(EPFL) (1996)

Martin, J.-P., Alvisi, L.: A framework for dynamic byzantine storage. In: Proc. of the Intl. Conf.on Dependable Systems and Networks, pp. 325–334 (2004)

Marzullo, K.: Maintaining the time in a distributed system. Ph.D. diss., Department of ElectricalEngineering, Stanford University, June (1984)

Marzullo, K.: Tolerating failures of continuous valued sensors. ACM Trans. Comput. Syst. 8(4),284–304 (1990)

Mattern, F.: Time and global states in distributed systems. In: Proceedings of the InternationalWorkshop on Parallel and Distributed Algorithms. North-Holland, Amsterdam (1989)

McKusick, M.K., Joy, W., Leffler, S., Fabry, R.S.: A fast file system for UNIX. Comput. Syst. 2(3),181–197 (1984). Retrieved 2008-12-30

Melliar-Smith, P.M., Moser, L.E.: Fault-tolerant distributed systems based on broadcast communi-cation. In: Proceedings of the Ninth International Conference on Distributed Computing Sys-tems, June 1989, pp. 129–133 (1989)

Melliar-Smith, P.M., Moser, L.E.: Trans: A reliable broadcast protocol. IEEE Trans. Commun.140(6), 481–493 (1993)

Melliar-Smith, P.M., Moser, L.E., Agrawala, V.: Membership algorithms for asynchronous dis-tributed systems. In: Proceedings of the IEEE Eleventh ICDCS, May 1991, pp. 480–488 (1991)

Milner, R., Tofte, M., Harper, R.: The Definition of Standard ML. MIT Press, Cambridge (1990)Mishra, S., Peterson, L.L., Schlichting, R.D.: A membership protocol based on partial order. In:

Proceedings of the IEEE International Working Conference on Dependable Computing for Crit-ical Applications, February 1991, pp. 137–145 (1991)

Mogul, J., Rashid, R., Accetta, M.: The packet filter: An efficient mechanism for user-level net-work code. In: Proceedings of the Eleventh ACM Symposium on Operating Systems Principles,Austin, November 1987, pp. 39–51. ACM Press, New York (1987)

Montresor, A.: System support for programming object-oriented dependable applications in parti-tionable systems. Ph.D. thesis, University of Bologna, Italy (2000)

Moser, L.E., Amir, Y., Melliar-Smith, P.M., Agarwal, D.A.: Extended virtual synchrony. In: Pro-ceedings of the Fourteenth International Conference on Distributed Computing Systems, June1994, pp. 56–65. IEEE Computer Society Press, New York (1994a). Also Technical ReportTR-93-22, Department of ECE, University of California, Santa Barbara, December (1993)

Page 14: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

716 References

Moser, L.E., Melliar-Smith, P.M., Agarwal, U.: Processor membership in asynchronous distributedsystems. IEEE Trans. Parallel Distrib. Syst. 5(5), 459–473 (1994b)

Moser, L.E., Melliar-Smith, P.M., Agarwal, D.A., Budhia, R.K., Lingley-Papadopoulos, C.A.:Totem: A fault-tolerant multicast group communication system. Commun. ACM 39(4), 54–63(1996)

Moss, J.E.: Nested transactions and reliable distributed computing. In: Proceedings of the SecondSymposium on Reliability in Distributed Software and Database Systems, pp. 33–39 (1982)

Mullender, S.J., et al.: Amoeba—A distributed operating system for the 1990s. IEEE Comput.23(5), 44–53 (1990)

Mummert, L.B., Ebling, M.R., Satyanarayanan, M.: Exploiting weak connectivity for mobile fileaccess. In: Proceedings of the Fifteenth Symposium on Operating Systems Principles, CopperMountain Resort, CO, December 1995, pp. 143–155. ACM Press, New York (1995). Also ACMTrans. Comput. Syst. 13(1) (1996)

Muthitacharoen, A., Chen, B., Mazieres, D.: A low-bandwidth network file system. In: 18thACM Symposium on Operating Systems Principles (SOSP ’01), Chateau Lake Louise, Banff,Canada, October 2001

Muthitacharoen, A., Morris, R., Gil, T., Ivy, B. Chen: A read/write peer-to-peer file system. In:Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation(OSDI ’02), Boston, Massachusetts, December 2002

National Bureau of Standards: Data Encryption Standard. Federal Information Processing Stan-dards Publication, vol. 46. Government Printing Office, Washington (1977)

Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of com-puters. Commun. ACM 21(12), 993–999 (1988)

Neiger, G.: A new look at membership services. In: Proceedings of the Fifteenth ACM Symposiumon Principles of Distributed Computing, Vancouver (1996). In press

Nelson, M., Welsh, B., Ousterhout, J.: Caching in the Sprite network file system. In: Proceedingsof the Eleventh ACM Symposium on Operating Systems Principles, Austin, November 1987.ACM Press, New York (1987). Also ACM Trans. Comput. Syst. 6(1) (1988)

Object Management Group and X/Open: Common Object Request Broker: Architecture and Spec-ification. Reference OMG 91.12.1 (1991)

Oki, B., Liskov, B.: Viewstamped replication: A new primary copy method to support highly-available distributed systems. In: Proceedings of the Seventh Annual ACM Symposium onPrinciples of Distributed Computing (PODC ’88), pp. 8–17. ACM, New York (1988)

Oki, B., Pfluegl, M., Siegel, A., Skeen, D.: The information bus-an architecture for extensibledistributed systems. In: Proceedings of the Thirteenth ACM Symposium on Operating SystemsPrinciples, Asheville, NC, December 1993, pp. 58–68. ACM Press, New York (1993)

Ostrowski, K., Birman, K.: Storing and accessing live mashup content in the cloud. SIGOPS Oper.Syst. Rev. 44(2) (2009)

Ostrowski, K., Birman, K., Dolev, D.: QuickSilver scalable multicast (QSM). In: 7th IEEE Inter-national Symposium on Network Computing and Applications (IEEE NCA 2008), Cambridge,MA, July 2008a

Ostrowski, K., Birman, K., Dolev, D., Ahnn, J.H.: Programming with live distributed objects. In:Vitek, J. (ed.) 22nd European Conference on Object-Oriented Programming (ECOOP 2008),Paphos, Cyprus, July 7–11, 2008. Lecture Notes in Computer Science, vol. 5142, pp. 463–489.Springer, Berlin (2008b)

Ousterhout, J.: Why aren’t operating systems getting faster as fast as hardware. In: USENIX Sum-mer Conference Proceedings, Anaheim, CA, pp. 247–256 (1990)

Ousterhout, J.: TCL and the TK Toolkit. Addison-Wesley, Reading (1994)Ousterhout, J., Da Costa, H., Harrison, D., Kunze, J.A., Kupfer, M., Thompson, J.G.: A trace-

driven analysis of the UNIX 4.2 BSD file system. In: Proceedings of the Tenth ACM Sympo-sium on Operating Systems Principles, Orcas Island, WA, December 1985, pp. 15–24. ACMPress, New York (1985)

Ousterhout, J., et al.: The sprite network operating system. Computer 21(2), 23–36 (1988)

Page 15: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 717

Pai, V.S., Druschel, P., Zwaenepoel, W.: IO-Lite: A unified I/O buffering and caching system. In:3rd Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, LA,February 1999

Patino-Martinez, M., Jimenez-Peris, R., Kemme, B., Alonso, G.: MIDDLE-R: Consistent databasereplication at the middleware level. Trans. Comput. Syst. 23(4) (2005)

Patterson, D., Gibson, G., Katz, R.: A case for redundant arrays of inexpensive disks (RAID). In:Proceedings of the 1988 ACM Conference on Management of Data (SIGMOD), Chicago, June1988, pp. 109–116 (1988)

Pedone, F., Guerraoui, R., Schiper, A.: Exploiting atomic broadcast in replicated databases. In:Proceedings EuroPar 98 (1998)

Petersen, K., Spreitzer, M., Terry, D., Theimer, M., Demers, A.: Flexible update propagation forweakly consistent replication. In: Proceedings of the 16th ACM Symposium on Operating Sys-tems Principles (SOSP-16), Saint Malo, France, October 5–8, pp. 288–301 (1997)

Peterson, L.: Preserving context information in an IPC abstraction. In: Proceedings of the SixthSymposium on Reliability in Distributed Software and Database Systems, March 1987, pp.22–31. IEEE Computer Society Press, New York (1987)

Peterson, I.: Fatal Defect: Chasing Killer Computer Bugs. Time Books/Random House, New York(1995)

Peterson, L., Buchholz, N.C., Schlicting, R.D.: Preserving and using context information in inter-process communication. ACM Trans. Comput. Syst. 7(3), 217–246 (1989a)

Peterson, L., Hutchinson, N., O’Malley, S., Abbott, M.: RPC in the x-kernel: Evaluating newdesign techniques. In: Proceedings of the Twelfth Symposium on Operating Systems Principles,Litchfield Park, AZ, November 1989, pp. 91–101. ACM Press, New York (1989b)

Powell, D. (ed.): Delta-4: A Generic Architecture for Dependable Distributed Computing.Springer-Verlag ESPRIT Research Reports, vol. I, Project 818/2252 (1991)

Powell, D.: Lessons learned from Delta-4. IEEE MICRO 14(4), 36–47 (1994)Powell, D.: Introduction to special section on group communication. Commun. ACM 39(4), 50–53

(1996)Pritchett, D.: BASE: An acid alternative. Queue 6(3), 48–55 (2008)Pu, D.: Relaxing the limitations of serializable transactions in distributed systems. Oper. Syst. Rev.

27(2), 66–71 (1993). (Special issue on the Workshop on Operating Systems Principles at LeMont St. Michel, France)

Rabin, M.: Randomized Byzantine generals. In: Proceedings of the Twenty-Fourth Annual Sympo-sium on Foundations of Computer Science, pp. 403–409. IEEE Computer Society Press, NewYork (1983)

Rashid, R.F.: Threads of a new system. UNIX Rev. 4, 37–49 (1986)Reed, D.P., Kanodia, R.K.: Synchronization with eventcounts and sequencers. Commun. ACM

22(2), 115–123 (1979)Reiher, P., et al.: Resolving file conflicts in the ficus file system. In: Proceedings of the Summer

USENIX Conference, June 1994, pp. 183–195 (1994)Reiter, M.K.: A security architecture for fault-tolerant systems. Ph.D. diss., Cornell University,

August (1993). Also Technical Report, Department of Computer Science, Cornell UniversityReiter, M.K.: Secure agreement protocols: Reliable and atomic group multicast in rampart. In:

Proceedings of the Second ACM Conference on Computer and Communications Security, Oak-land, November 1994, pp. 68–80 (1994a)

Reiter, M.K., A secure group membership protocol. In: Proceedings of the 1994 Symposium onResearch in Security and Privacy, Oakland, May 1994, pp. 89–99. IEEE Computer SocietyPress, New York (1994b)

Reiter, M.K.: Distributing trust with the Rampart toolkit. Commun. ACM 39(4), 71–75 (1996)Reiter, M.K., Birman, K.P.: How to securely replicate services. ACM Trans. Program. Lang. Syst.

16(3), 986–1009 (1994)Reiter, M.K., Birman, K.P., Gong, L.: Integrating security in a group-oriented distributed system.

In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, May1992, pp. 18–32. IEEE Computer Society Press, New York (1992)

Page 16: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

718 References

Reiter, M., Birman, K.P., van Renesse, R.: A security architecture for fault-tolerant systems. Trans.Comput. Syst. 12(4), 340–371 (1994)

Ricciardi, A.M.: The group membership problem in asynchronous systems. Ph.D. diss., CornellUniversity, January (1993)

Ricciardi, A.: The impossibility of (repeated) reliable broadcast. Technical Report TR-PDS-1996-003, Department of Electrical and Computer Engineering, University of Texas, Austin, April(1996)

Ricciardi, A., Birman, K.P.: Using process groups to implement failure detection in asynchronousenvironments. In: Proceedings of the Eleventh ACM Symposium on Principles of DistributedComputing, Quebec, August 1991, pp. 341–351. ACM Press, New York (1991)

Ricciardi, A., Birman, K.P., Stephenson, P.: The cost of order in asynchronous systems. In:WDAG 1992. Lecture Notes in Computer Science, pp. 329–345. Springer, Berlin (1992)

Ritchie, D.M.: A stream input-output system. AT&T Bell Lab. Tech. J. 63(8), 1897–1910 (1984)Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key

cryptosystems. Commun. ACM 22(4), 120–126 (1978)Rodeh, O., Birman, K., Dolev, D.: Using AVL trees for fault-tolerant group key management. Int.

J. Inf. Secur. 1(2), 84–99 (2002)Rodrigues, L., Verissimo, P.: xAMP: A MultiPrimitive group communications service. In: Pro-

ceedings of the Eleventh Symposium on Reliable Distributed Systems, Houston, October 1989.IEEE Computer Society Press, New York (1989)

Rodrigues, L., Verissimo, P.: Causal separators for large-scale multicast communication. In: Pro-ceedings of the Fifteenth International Conference on Distributed Computing Systems, May1995, pp. 83–91 (1995)

Rodrigues, L., Verissimo, P., Rufino, J.: A low-level processor group membership protocol forLANs. In: Proceedings of the Thirteenth International Conference on Distributed ComputingSystems, May 1993, pp. 541–550 (1993)

Rodrigues, L., Guo, K., Verissimo, P., Birman, K.P.: A dynamic light-weight group service. J.Parallel Distrib. Comput. 60, 1449–1479 (2000)

Rosenblum, M., Ousterhout, J.K.: The design and implementation of a log-structured file system.In: Proceedings of the Twelfth ACM Symposium on Operating Systems Principles, Asilomar,CA, October 1991, pp. 1–15. ACM Press, New York (1991). Also ACM Trans. Comput. Syst.10(1), 26–52 (1992)

Rowe, L.A., Smith, B.C.: A continuous media player. In: Proceedings of the Third InternationalWorkshop on Network and Operating Systems Support for Digital Audio and Video, San Diego,CA, November 1992

Rozier, M., et al.: Chorus distributed operating system. Comput. Syst. J. 1(4), 305–370 (1988a)Rozier, M., et al.: The Chorus distributed system. Comput. Syst. 299–328 (1988b)Sabel, L., Marzullo, K.: Simulating fail-stop in asynchronous distributed systems. In: Proceedings

of the Thirteenth Symposium on Reliable Distributed Systems, Dana Point, CA, October 1994,pp. 138–147. IEEE Computer Society Press, New York (1994)

Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-end arguments in system design. ACM Trans. Com-put. Syst. 39(4) (1990)

Santry, D.S., Feeley, M.J., Hutchinson, N.C., Veitch, A.C., Carton, R.W., Ofir, J.: Deciding whento forget in the Elephant file system. In: Proceedings of the Seventeenth ACM Symposiumon Operating Systems Principles, SOSP ’99, Charleston, South Carolina, United States, pp.110–123. ACM, New York (1999)

Satyanarayanan, M., et al.: The ITC distributed file system: Principles and design. In: Proceedingsof the Tenth ACM Symposium on Operating Systems Principles, Orcas Island, WA, December1985, pp. 35–50. ACM Press, New York (1985)

Satyanarayanan, M., et al.: Integrating security in a large distributed system. ACM Trans. Comput.Syst. 7(3), 247–280 (1989)

Schantz, R.E., Thomas, R.H., Bono, G.: The architecture of the Chronus distributed operating sys-tem. In: Proceedings of the Sixth International Conference on Distributed Computing Systems,New York, June 1986, pp. 250–259. IEEE Computer Society Press, New York (1986)

Page 17: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 719

Schiller, J.I.: Secure distributed computing. Sci. Am. 72–76 (1994)Schiper, A., Raynal, M.: From group communication to transactions in distributed systems. Com-

mun. ACM 39(4), 84–87 (1996)Schiper, A., Eggli, J., Sandoz, A.: A new algorithm to implement causal ordering. In: Proceedings

of the Third International Workshop on Distributed Algorithms. Lecture Notes in ComputerScience, vol. 392, pp. 219–232. Springer, Berlin (1989)

Schiper, A., Shvartsman, A.A., Weatherspoon, H., Zhao, B.: Future Directions in Distributed Com-puting, Research and Position Papers. Springer, Berlin (2003)

Schmuck, F.: The use of efficient broadcast primitives in asynchronous distributed systems. Ph.D.diss., Cornell University, August (1988). Also Technical Report, Department of Computer Sci-ence, Cornell University

Schmuck, F., Wyllie, J.: Experience with transactions in quicksilver. In: Proceedings of the TwelfthACM Symposium on Operating Systems Principles, Asilomar, CA, October 1991, pp. 239–252.ACM Press, New York (1991)

Schneider, F.B.: Byzantine generals in action: Implementing fail-stop processors. ACM Trans.Comput. Syst. 2(2), 145–154 (1984)

Schneider, F.B.: The StateMachine approach: A tutorial. In: Proceedings of the Workshop on Fault-Tolerant Distributed Computing, Asilomar, CA. Lecture Notes on Computer Science, vol. 448,pp. 18–41. Springer, Berlin (1988)

Schneider, F.B.: Implementing fault-tolerant services using the StateMachine approach. ACMComput. Surv. 22(4), 299–319 (1990)

Schneider, F.B., Walsh, K., Sirer, E.G.: Nexus authorization logic (NAL): Design rationale andapplications. ACM Trans. Inf. Syst. Secur. 14(1), 8 (2011). 28 pages

Seltzer, M.: Transaction support in a log-structured file system. In: Proceedings of the Ninth Inter-national Conference on Data Engineering, April 1993

Shieh, A., Sirer, E.G., Schneider, F.B.: NetQuery: A knowledge plane for reasoning about net-work properties. In: Proceedings of the ACM SIGCOMM 2011 Conference on SIGCOMM(SIGCOMM ’11), pp. 278–289. ACM, New York (2011)

Shraer, A., Martin, J.-P., Malkhi, D., Keidar, I.: Data-centric reconfiguration with network-attacheddisks. In: Large-Scale Distributed Systems and Middleware (LADIS 2010), July 2010

Shroeder, M., Burrows, M.: Performance of firefly RPC. In: Proceedings of the Eleventh ACMSymposium on Operating Systems Principles, Litchfield Springs, AZ, December 1989, pp. 83–90 (1989). Also ACM Trans. Comput. Syst. 8(1), 1–17 (1990)

Siegal, A.: Performance in flexible distributed file systems. Ph.D. diss., Cornell University, Febru-ary (1992). Also Technical Report TR-92-1266, Department of Computer Science, CornellUniversity

Siegel, A., Birman, K.P., Marzullo, K.: Deceit: A flexible distributed file system. Technical Report89-1042, Department of Computer Science, Cornell University (1989)

Simons, B., Welch, J.N., Lynch, N.: An overview of clock synchronization. In: Simons, B., Spector,A. (eds.) Fault-Tolerant Distributed Computing. Lecture Notes in Computer Science, vol. 448,pp. 84–96. Springer, Berlin (1990)

Skeen, D.: Crash recovery in a distributed database system. Ph.D. diss., Department of EECS,University of California, Berkeley, June (1982a)

Skeen, D.: A quorum-based commit protocol. In: Proceedings of the Berkeley Workshop on Dis-tributed Data Management and Computer Networks, Berkeley, CA, February 1982, pp. 69–80(1982b)

Skeen, D.: Determining the last process to fail. ACM Trans. Comput. Syst. 3(1), 15–30 (1985)Spasojevic, M., Satyanarayanan, M.: An empirical study of a wide area distributed file system.

ACM Trans. Comput. Syst. 14(2) (1996)Spector, A.: Distributed transactions for reliable systems. In: Proceedings of the Tenth ACM

Symposium on Operating Systems Principles, Orcas Island, WA, December 1985, pp. 12–146(1985)

Srikanth, T.K., Toueg, S.: Optimal clock synchronization. J. ACM 34(3), 626–645 (1987)

Page 18: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

720 References

Srinivasan, V., Mogul, J.: Spritely NFS: Experiments with cache consistency protocols. In:Proceedings of the Eleventh ACM Symposium on Operating Systems Principles, LitchfieldSprings, AZ, December 1989, pp. 45–57 (1989)

Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An authentication service for open networksystems. In: Proceedings of the 1988 USENIX Winter Conference, Dallas, February 1988, pp.191–202 (1988)

Stephenson, P.: Fast causal multicast. Ph.D. diss., Cornell University, February (1991). Also Tech-nical Report, Department of Computer Science, Cornell University

Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peerlookup service for Internet applications. In: ACM SIGCOMM 2001, San Diego, CA, August2001, pp. 149–160 (2001)

Strom, R.E., Banavar, G., Chandra, T.D., Kaplan, M., Miller, K., Mukherjee, B., Sturman, D.C.,Ward, M.: Gryphon: An information flow based approach to message brokering. CoRR (1998)

Tanenbaum, A.: Computer Networks, 2nd edn. Prentice Hall, Englewood Cliffs (1988)Tanenbaum, A., van Renesse, R.: A critique of the remote procedure call paradigm. In: Proceedings

of the EUTECO ’88 Conference, Vienna, April 1988, pp. 775–783 (1988)Terry, D.B., et al.: Managing update conflicts in a weakly connected replicated storage system. In:

Proceedings of the Fifteenth Symposium on Operating Systems Principles, Copper MountainResort, CO, December 1995, pp. 172–183. ACM Press, New York (1995)

Thekkath, C.A., Levy, H.M.: Limits to low-latency communication on high-speed networks. ACMTrans. Comput. Syst. 11(2), 179–203 (1993)

Thekkath, C., Mann, T., Lee, E.: Frangipani: A scalable distributed file system. In: 16th ACMSymposium on Operating Systems Principles (SOSP), Saint-Malo, France, October 1997

Thomas, T.: A majority consensus approach to concurrency control for multiple copy databases.ACM Trans. Database Syst. 4(2), 180–209 (1979)

Tock, Y., Naaman, N., Harpaz, A., Gershinsky, G.: Hierarchical clustering of message flows in amulticast data dissemination system. In: IASTED PDCS (2005)

van Renesse, R.: Causal controversy at Le Mont St.-Michel. Oper. Syst. Rev. 27(2), 44–53 (1993)van Renesse, R.: Why bother with CATOCS? Oper. Syst. Rev. 28(1), 22–27 (1994)van Renesse, R.: Paxos made moderately simple. Technical report, Cornell University, March

(2011)van Renesse, R., Schneider, F.B.: Chain replication for supporting high throughput and availabil-

ity. In: Sixth Symposium on Operating Systems Design and Implementation (OSDI ’04), SanFrancisco, CA, December 2004

van Renesse, R., van Staveren, H., Tanenbaum, A.: Performance of the world’s fastest operatingsystem. Oper. Syst. Rev. 22(4), 25–34 (1988)

van Renesse, R., van Staveren, H., Tanenbaum, A.: The performance of the Amoeba distributedoperating system. Softw. Pract. Exp. 19(3), 223–234 (1989)

van Renesse, R., Birman, K.P., Friedman, R., Hayden, M., Karr, D.: A framework for protocolcomposition in Horus. In: Proceedings of the Fourteenth Symposium on the Principles of Dis-tributed Computing, Ottawa, August 1995, pp. 80–89. ACM Press, New York (1995)

van Renesse, R., Birman, K.P., Maffeis, S.: Horus: A flexible group communication system. Com-mun. ACM 39(4), 76–83 (1996)

van Renesse, R., Birman, K.P., Hayden, M., Vaysburd, A., Karr, D.: Building adaptive systemsusing Ensemble. In: Software—Practice and Experience, August 1998

van Renesse, R., Birman, K.P., Vogels, W.: Astrolabe: A robust and scalable technology for dis-tributed system monitoring, management, and data mining. ACM Trans. Comput. Syst. 21(2),164–206 (2003)

Verissimo, P.: Real-time communication. In: Mullender, S.J. (ed.) Distributed Systems, 2nd edn.,pp. 447–490. Addison-Wesley/ACM Press, Reading (1993)

Verissimo, P.: Ordering and timeliness requirements of dependable real-time programs. J. Real-Time Syst. 7(2), 105–128 (1994)

Verissimo, P.: Uncertainty and predictability: Can they be reconciled. In: Future Directions in Dis-tributed Computing, pp. 108–113. Springer, Berlin (2003)

Page 19: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

References 721

Verissimo, P., Rodrigues, L.: A-posteriori agreement for fault-tolerant clock synchronization onbroadcast networks. In: Proceedings of the Twenty-Second International Symposium on Fault-Tolerant Computing, Boston, July 1992

Vigfusson, Y.: Affinity in distributed systems. PhD dissertation. Cornell University, Sept. (2009).(Degree conferred Feb. 2010)

Vigfusson, Y., Birman, K., Huang, Q., Nataraj, D.P.: GO: Platform support for Gossip applications.In: IEEE P2P 2009, Seattle, WA, September 9–11, pp. 222–231 (2009)

Vigfusson, Y., Abu-Libdeh, H., Balakrishnan, M., Birman, K., Burgess, R., Li, H., Chockler,G., Tock, Y.: Dr. Multicast: Rx for data center communication scalability. In: Eurosys, ACMSIGOPS, Paris, France, April 2010, pp. 349–362 (2010)

Vitenberg, R., Chockler, G.V., Keidar, I.: Group communication specifications: A comprehensivestudy. ACM Comput. Surv. 33(4) (2001)

Vogels, W.: The private investigator. Technical Report, Department of Computer Science, CornellUniversity, April (1996)

Vogels, W.: File system usage in Windows NT 4.0. In: Proceedings of the Seventeenth ACM Sym-posium on Operating Systems Principles, SOSP’99, Charleston, South Carolina, United States,pp. 93–109. ACM, New York (1999)

Vogels, W.: Eventually consistent—Revisited. http://www.allthingsdistributed.com/2008/12/eventually_consistent.html. Dec (2008)

Vogels, W., Re, C.: WS-membership—failure management in a Web-Services World. In: 12th In-ternational World Wide Web Conference, Budapest, Hungary, May 2003

von Eicken, T., Culler, D.E., Goldstein, S.C., Schauser, K.E.: Active messages: A mechanism forintegrated communication and computation. In: Proceedings of the Nineteenth InternationalSymposium on Computer Architecture, May 1992, pp. 256–266 (1992)

von Eicken, T., Basu, A., Buch, V., Vogels, W.: U-Net: A user-level network interface for paralleland distributed computing. In: Proceedings of the Fifteenth Symposium on Operating SystemsPrinciples, Copper Mountain Resort, CO, December 1995, pp. 40–53. ACM Press, New York(1995)

Voulgaris, S., van Steen, M.: Epidemic-style management of semantic overlays for content-basedsearching. In: Euro-Par 2005, pp. 1143–1152 (2005)

Voulgaris, S., Kermarrec, A.M., Massoulié, L., van Steen, M.: Exploiting semantic proximity inpeer-to-peer content searching. In: FTDCS 2004, pp. 238–243 (2004)

Voulgaris, S., van Steen, M., Iwanicki, K.: Proactive gossip-based management of semantic overlaynetworks. Concurr. Comput. 19(17), 2299–2311 (2007)

Wahbe, R., Lucco, S., Anderson, T., Graham, S.: Efficient software-based fault isolation. In: Pro-ceedings of the Thirteenth ACM Symposium on Operating Systems Principles, Asheville, NC,December 1993, pp. 203–216. ACM Press, New York (1993)

Waldman, M., Mazières, D.: Tangler: A censorship-resistant publishing system based on documententanglements. In: Proceedings of the 8th ACM Conference on Computer and CommunicationsSecurity, November, pp. 126–135 (2001)

Walter, B., et al.: The locus distributed operating system. In: Proceedings of the Ninth ACM Sym-posium on Operating Systems Principles, Bretton Woods, NH, October 1993, pp. 49–70 (1993)

Wang, Y., Keller, E., Biskeborn, B., van der Merwe, J., Rexford, J.: Virtual routers on the move:Live router migration as a network-management primitive. In: Proc. ACM SIGCOMM, August2008

Weatherspoon, H., Kubiatowicz, J.: Erasure coding vs. replication: A quantitative comparison. In:IPTPS 2002, pp. 328–338 (2002)

Weatherspoon, H., Ganesh, L., Marian, T., Balakrishnan, M., Birman, K.: Smoke and mirrors: Re-flecting files at a geographically remote location without loss of performance. In: Proceedingsof the 7th USENIX Conference on File and Storage Technologies (FAST), February 2009

Welsh, M., Culler, D., Brewer, E.: SEDA: An architecture for well-conditioned, scalable Internetservices. In: 18th Symposium on Operating Systems Principles (SOSP), Banff, Canada, Octo-ber 2001

Page 20: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

722 References

Wilkes, J., et al.: The HP AutoRAID hierarchical storage system. In: Proceedings of the FifteenthSymposium on Operating Systems Principles, Copper Mountain Resort, CO, December 1995,pp. 96–108. ACM Press, New York (1995). Also ACM Trans. Comput. Syst. 13(1) (1996)

Wong, B., Slivkins, A., Sirer, E.G.: Meridian: A lightweight network location service without vir-tual coordinates. In: Proceedings of the 2005 Conference on Applications, Technologies, Ar-chitectures, and Protocols for Computer Communications (SIGCOMM ’05), pp. 85–96. ACM,New York (2005)

Wood, M.D.: Fault-tolerant management of distributed applications using a reactive system archi-tecture. Ph.D. diss., Cornell University, December (1991). Also Technical Report TR 91-1252,Department of Computer Science, Cornell University

Wood, M.D.: Replicated RPC using Amoeba closed-group communication. In: Proceedings of theTwelfth International Conference on Distributed Computing Systems, Pittsburgh (1993)

Yeger-Lotem, E., Keidar, I., Dolev, D.: Dynamic voting for consistent primary components. In:16th ACM Symposium on Principles of Distributed Computing (PODC’97), pp. 63–71 (1997)

Yu, Y., Isard, M., Fetterly, D., Budiu, M., Erlingsson, U., Gunda, P., Currey, J.: DryadLINQ: Asystem for general-purpose distributed data-parallel computing using a high-level language. In:ACM Symposium on Operating System Design and Implementation (OSDI), San Diego, CA,December 8–10, 2008

Zagorodnov, D., Marzullo, K., Alvisi, L., Bressoud, T.C.: Practical and low-overhead masking offailures of TCP-based servers. ACM Trans. Comput. Syst. 27(2) (2009)

Zhao, B., Duan, Y., Huang, L., Joseph, A.D., Kubiatowicz, J.: Brocade: Landmark routing onoverlay networks. In: IPTPS 2002, pp. 34–44 (2002a)

Zhao, Duan, B.Y., Huang, L., Joseph, A.D., Kubiatowicz, J.D.: Brocade: Landmark routing onoverlay networks. In: First International Workshop on Peer-to-Peer Systems (IPTPS), Cam-bridge, MA, March 2002b

Page 21: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

Index

AA-posteriori clock synchronization, 575Acceptor processes (Paxos), 463Access control technologies, 551Accidental failures compared to attack, 295ACE (Adaptive Computing Environment), 250ACID database consistency model, 448ACID properties in database systems, 150ACID properties of a database system, 241Active messages, 276Active Registry (Windows), 201AES (Advanced Encryption System), as used

web security, 83AFS, 227–230, 232, 235, 552Agarwal’s replication algorithm for

transactional databases, 605Aggregation, 625Amnesia-freedom in a first-tier cloud service,

448Amnesia-freedom in cloud services, 374ANSA project, 250Architectural structures for reliable systems,

510AS/400 database server product, 597ASP (Application Service Page), 72Astrolabe, 623Asynchronous consensus problem, 362Asynchronous model, 317, 360Asynchronous system (as used in FLP result),

21At least once semantics, 206At most once semantics, 206ATM, 282ATOM web page encoding, 74Atomic rename operation, 245Atomicity, 241, 383Attack spectrum seen in the Internet, 140Authentication, 202, 227, 228, 475, 545, 547,

554, 559, 567, 568in Kerberos, 547

Authentication (with wrappers), 484Authority chains in secure systems, 564Authorization, 298Availability

in secure systems, 559, 567Availability (as used in CAP), 23Azure, 473Azure, used for cloud development, 473

BBASE methodology, 28, 448Beehive, 452Beehive one-hop DHT, 128BGP (Border Gateway Protocol), 109BiFocals network instrumentation, 167BigTable, vi, 443, 452BigTable (Google’s scalable row-column

store), 159Bimodal multicast, 609Binding, 187, 195, 259, 265BitTorrent, vi, 12, 15, 136Bloom filters (used to implement IP multicast

routing), 14Bohrbugs, 289Brewer’s CAP conjection, 22Broadcast storms, 11Byzantine Agreement, 355Byzantine Agreement used in highly robust

servers, 359Byzantine failure model, 63, 354–361, 365,

387, 420, 547, 568lower bounds, 356

Byzantine failure model, used for cloudcomputing, 357

Byzantine Quorum Systems, 359

CCache coherency in Sprite, 229Caching, 214, 224Caching web proxies

consistency options, 493

K.P. Birman, Guide to Reliable Distributed Systems, Texts in Computer Science,DOI 10.1007/978-1-4471-2416-0, © Springer-Verlag London Limited 2012

723

Page 22: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

724 Index

CAP Conjecture and Theorem, 22CAP Theorem, 148CAP theorem, 448CASD protocols, 577Cassandra key-value store, 164Causal gap freedom, 412Causal order, 317

in overlapping process groups, 411with multiple, overlapping groups, 397

CausalSend, 370, 388, 403, 434compared to synchronous multicast

protocol, 583in overlapping process groups, 411

Chains of authority, 564Chord DHT, 123Chubby, vi, 26Chubby (Google’s locking service), 165Client mobility, 95Client/server computing, 185, 245Clients of a process group, 399Clock synchronization, 571Closely synchronous execution, 421Cloud computing: replicating soft-state, 497Cloud security limitations, 543Cloud Storage, 180Cluster computing used in telecommunications

coprocessor, 586CODA, 229Coherent cache, 73Coherent caching Web proxy, 492Commercial off the shelf (COTS), 474Communication from a group to a

non-member, 402Communication from non-members to a

group, 399Communications segment, 279Complexity as a threat to reliability, 292Components of a reliable distributed

computing system, 63Computer network, 50Concurrency control, 240Concurrency control tools, 488Concurrency in cloud applications, 73Conservative scheme, 412Consistency, 61, 301, 458, 459, 599Consistency, need for in soft-state services,

443Consistency (as used in CAP), 23Consistency in caching web proxies, 510Consistency (in cloud settings), 34Consistency in network routing, 115Consistent and inconsistent cuts, 318, 394Consistent caching, 484Continuous availability, 61

Continuous Media Toolkit (CMT), 520Controlling and monitoring an insulin pump

from a cloud service, 29Convoy phenomenon in reliable systems, 534Coordinator-cohort algorithm, 440Corba, xiii, 249, 252–256, 258–260, 262–265,

293, 481, 522, 523event notification service, 262hardening applications with Horus/Electra,

522inter-object broker protocol (IOP), 264interface definition language (IDL), 255,

260introducing reliability technologies with,

477life cycle service, 264naming service, 262object request broker (ORB), 254, 261Orbix example, 257persistent object service, 264rebinding to a different server after failure,

259reference model, 254reliability issues, 259reliability properties of Corba solutions,

265transactional services, 259, 264viewed as a wrapper technology, 477

CORBA Fault Tolerance Standard, 477Correct specification, 61COTS (Commercial off the shelf), 474Cyclic UDP, 520

DData access patterns in distributed file systems,

229Data aggregation, 625Data mining, 623Data privacy (in cloud settings), 34Data replication, 35Data replication in cloud systems, 12DCE, xiii, 202Defense against intrusion and attack, 295Denial of access in secure systems, 559DES, 556Detecting failures, 294DHTs (Distributed Hash Tables), 122Dialback security mechanisms, 549Dining Philosophers problem, 414DiskLogger, 447, 463Distances within the Internet, 55Distributed commit problem, 323Distributed computing system, 50

Page 23: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

Index 725

Distributed database systems, 236, 237abort viewed as a “tool”, 242ACID properties, 241concurrency control, 239, 592nested transactions, 594serializability, 238state shared by clients and server, 241transactional model, 238, 587write-ahead log, 589

Distributed programming languages, 488Distributed shared memory, 499, 505Distributed system control, 623Distributed transaction, 592DNS, 200Dr. Multicast, 11, 17Dryad/Linq, 488DSM, 505Durability (as implied by CAP definition of

consistency), 23Dynamic membership model, 313, 314, 339,

458Dynamic uniformity, 601Dynamo, 443, 452Dynamo (Amazon’s scalable key-value store),

162

EElectra, 522Embarrassing parallelism, 73Encryption used in virtual private networks,

551ENS, 262Ensemble system

relationship with Horus, 509Enterprise web servers, 510Eternal System (UCSD implementation of

CORBA Fault-Tolerance Standard),477

Event notification service, 262Exactly once semantics, 206Expander graphs (in gossip peer selection),

133Expansion property of a gossip overlay graph,

616Extended virtual synchrony, 424Extensible routers, 116External Data Representation, 197

FFail-safe behavior, 34Fail-stop failures, 62Failover in Corba, 477Failure detectors, 294Failures, 62

False sharing, 504, 505Fault-tolerance, 61, 484, 506Fault-Tolerance (FLP result, CAP Theorem),

21Fault-tolerance (in cloud settings), 34Fault-tolerance tools, 488Fault-tolerant real-time control, 573Fbufs, 274Ficus, 232Filtering actions as a way to enforce security,

566Firefly RPC costs, 271Firewall protection (with wrappers), 484Firewalls, 475, 548First tier cloud services, 155Flash, 74Flush, 416Flush primitive, 374

GGap freedom guarantee, 424GFS, 233, 247Global file systems, viGlobally total order, 414GMS property summary, 385Google AppEngine, 473Google File System (GFS), 26, 233, 247Gossip Objects (GO), 633GPS receivers, 571, 576, 694Group address, 516Group communication and Java applets, 510Group communication in Web applications,

492Group membership protocol, 210, 343, 468Group membership service, 385

extensions to allow partition and merge,352

primary partition properties, 351summary of properties, 385

Group object, 516Guaranteed execution tools, 488

HHadoop, vi, 27, 174, 443Halting failures, 62Hard state in the cloud, 157Hard-state replication, 453Hard-state replication using virtual synchrony

model, 442Hardware cryptographic protection, 551Harp, 225HCPI, 518Health care records in cloud settings, 28Heisenbugs, 289, 422

Page 24: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

726 Index

High assurance soft-state services, 443High availability, 61High availability TCP sessions, 113High-assurance for health-care systems, 497Highly available routers, 113Horus system

basic performance, 523, 535Horus Common Protocol Interface (HCPI),

518protocol accelerator, 526real-time protocols, 584replication in the Web, 513robust groupware application, 519

Hostile environments, 295HPC (High Performance Computing), on

Cloud Platforms, 177HRT (Hardware Root of Trust), 85HTML (Hypertext Markup language, 71HTTP (Hypertext Transfer Protocol, 71HTTPS (Secure version of HTTP protocol), 84

IID-90, 278IDL, 255Impossibility results for the asynchronous

model, 364IN coprocessor fault-tolerance, 586Information warfare, 295Insulin pump (controlled by a cloud

application), 28Intentional threats, 295Internet Indirection Infrastructure (I3), 135Internet of things, 76IP multicast, 12IP multicast (management of the IPMC

address space), 17Isis2 System, 509Iterated multicast, 400

JJ2EE, 203, 204, 249, 252, 253, 625Java

groupware opportunities, 492integrated with group communication

tools, 510Java applets structured as object groups,

492Java Enterprise Edition, 249JavaGroups (JGroups), 510JavaGroups (JGroups), in JBOSS, 489Javascript, 74JBOSS, 489JDBC, 625JGroups, viJVM (Java Virtual Machine), 74

KKelips one-hop DHT, 129Kerberos, 202, 203, 227, 545, 548, 554, 557,

559, 567Kerberos authentication, 228Key-value storage services, 158Key-value stores, 443

LLearner processes (Paxos), 463LFS, 235Lightweight Probabilistic Broadcast Protocol,

616Lightweight process groups, 417Lightweight remote procedure call, 271–274Live Distributed Objects, 686Load balancing, 437Local procedure call, 206Locally total order, 414Log-structured file system, 235Logical clock, 317

used to implement CausalSend, 389Long-haul connection (security exposures),

551Lotus Notes, 236LPC, 206

MMaelstrom network encoding scheme, 167Malkhi, 447, 463Management information base (MIB), 625MapReduce, vi, 27, 174, 443MARS, 573Marshalling, 197Master-slave parallel programming style, 278Measurements of distributed file systems, 229Memcached, vi, 443, 452Memcached (scalable key-value store), 158Meridian network coordinates system, 55Message, 50Message Queuing Middleware, 169MIB used for failure detection, 294Microsoft .NET, 189, 191, 192, 195, 252, 253,

291, 371, 625Microsoft Azure, 473Microsoft Visual Studio, used for cloud

development, 473Mobile computing, 95MOM (Message Oriented Middleware), 169Monitoring, 623Monitoring and controlling an insulin pump

from a cloud service, 29

Page 25: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

Index 727

Monitoring and logging (with wrappers), 485Multi-level architecture for group computing

tools, 510Multi-phase commit, 592Multicast

consistency issues, 468ordering domains, 415ordering protocols (causal and total), 386stability, 412totally ordered, 397

Multicast deliveryflush used to force strong durability, 374

Multicast delivery property, 374Multicore client systems, 97

NNetwork Coordinates, 55Network database server, 186, 236, 237Network file server, 186, 219, 237Network file servers

replication for high availability, 225Network File System, 197Network Information Service, 200Network partitioning, 62, 424Network Perspective, 101Network Reliability, 101Nexus: A secure microkernel, 546NFS, xiii, 187, 197, 209, 210, 223–227,

230–232, 235, 552, 553, 560prefetching, 224reliability of, 225security of, 560security problems with, 553

NIS, 200.NET, 189, 191, 195, 204, 249, 252, 253, 489,

625

OObject groups, 477, 522Object orientation

groupware solutions, 478technologies supporting, 478viewed as a form of wrapper, 478

Object Request Broker, 254ODBC, 625Off the shelf components (COTS), 474OLE-2

introducing reliability technologies with,477

viewed as a wrapper technology, 477Omission failures, 62On-the-fly security enforcement, 566ONC, xiii, 488, 560

security of, 560

One-hop DHTs, 128, 129OpenFlow standard, 105Orbix, 257Orbix+Isis, 522OrderedCausalSend, 371OrderedSend, 371, 403, 434

locally total and globally total ordering,414

Orleans distributed programming language,488

Overhead of layered protocols, 529Overlay Networks, 118

PP2P protocols, 609Packet filter, 475Packet sniffers, 548Parallel computing (communication support),

278Partition failures, 424Partition Tolerance (as used in CAP), 23Passwords, 548Pastry DHT, 126Paxos, 380, 387, 427, 447, 462, 463Paxos (history of the area), 303Paxos protocol, 463Pbcast, 610Peer-to-peer aggregation, 625Peer-to-peer communication, 609Performance, 62Performance issues in file systems, 229Persistent data, 588PNUTS, 452PNUTS key-value store, 164Potential causality, 317Potential groupware uses of the Web, 492Power law distributions, 153Prefetching in NFS, 224Prefetching versus whole-file transfer, 224Primary component of a partitioned network,

424, 466Primary partition model, 343Primary-backup fault-tolerance, 438Privacy, 61Private investigator (failure detection scheme),

294ProbabilisticSend, 610Protocol, 60Protocol stack, 514Publish subscribe

process group implementation, 519Publish-subscribe

implemented over scalable multicast, 620Publish-subscribe model, 137

Page 26: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

728 Index

QQuality of service negotiation (with wrappers),

485QuickSilver, 244, 620Quorum replication, 433

RRAID, 226Real-time, 573

CASD protocol, 577fault-tolerant, in MARS, 573Horus protocols, 584

Real-time virtual synchrony, 586Recoverability, 61, 588Release consistency, 502Reliability in distributed computing systems,

61Reliability of NFS, 224Reliability standards (for web services), 81Reliable multicast

in synchronous systems, 577Remote procedure call, 185, 186, 189

authentication service, 202binding, 195error handling, 194lightweight, 272marshalling, 197naming service, 200over TCP, 211performance issues, 271protocol, 204replay problem, 206use in reliable distributed systems, 208

Remote procedure call stub generation, 191Rename (atomic operation), 245Replicated data, 225, 421, 430

best solution, 433high performance transactional scheme,

603in transactional systems, 593with Byzantine failures, 354

Replicated data tools, 488Replication algorithm for transactional

databases, 605Replication and load-balancing in Web servers,

492Replication of web servers, 510RON (Resilient Overlay Network), 119RPC, 186RSA, 555RSS Feed, 74Runtime security enforcement, 566

SSafe execution of downloaded code, 87SafeSend, 372, 387SafeSend, with a DiskLogger durability

method, 447, 463SafeSend protocol, 463Scalability, 61Scalability analysis of Spread Toolkit, 535Scalable data mining, 623Scalable virtual synchrony, 617Security, 61, 202, 207, 265, 506, 543

and Availability, 567by filtering operations on-the-fly, 566enclave, 484in cloud systems, 34in Isis2, 543policy languages and inference, 564standards (for web services), 83with wrappers, 484

SEDA, 284Selecting peers in a gossip protocol, 617Self-optimizing mesh construction, 133Send, 370Send, 388Send, 403Sharded data, 443Sharded data (updated using ordered

multicast), 414Sharding, 452Shared memory

used for ATM communication in U-Net,280

Shared memory tools, 488Sienna content-based publish-subscribe

system, 137Simple Object Access Protocol, 187Singularity distributed programming

environment, 488Sliver, 633Small World Graphs (importance in gossip

peer selection), 133Smart power grid, 497SMFS: the Smoke and Mirrors File System,

167Snapshot isolation, 27, 164, 443Snapshot Isolation, 606Snapshot of a distributed system, 318SOAP (Simple Object Access Protocol), 76,

187Soft state, 24Soft state data replication, 157, 448, 497Soft-state replication using virtual synchrony

model, 442SPKI/SDSI, 564

Page 27: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

Index 729

Split C, 278Split secret schemes, 568Spread, vi, 510, 535Spread Toolkit, 509Sprite, 230SS7 telecommunications protocol, 586SSL (Secure Socket Layer), 84SSL security protocol, 561Stability of a multicast, 412State machine approach, 421State transfer, 402, 435Stateful client/server systems, 216, 238Stateful File Servers, 227Stateless client/server systems, 216Static membership model, 309, 339, 458Streams

unbreakable (wrapped for reliability), 496Strong and weak virtual synchrony in Horus,

586Strong durability, 376, 387, 399, 423, 430,

433, 434performance implications, 462

Strong durability multicast delivery property,374

Synchronous model, 354System management, 623

TTAO (The ACE Orb), 250, 489Tcl/Tk, 519TCP

used to support remote procedure call, 211TCP protocol (over U-Net), 282TCP (Trusted Computing Base), 85Telecommunications coprocessor, 586Testing for liveness of an application, 294The Layers of a Cloud, 146The Sinfonia replication service, 166The Web, 186, 216, 489

architectural structures and reliability tools,510

fault-tolerance and load-balancing, 492groupware tools and solutions, 492Java applets structured as object groups,

492replication and reliability, 513security with digital signatures, 492

Three-phase commit, 592Tiers of cloud computing services, 22Time in distributed systems, 316Timed asynchronous model, 576Timeliness, 62Timing failures, 62Token passing, 371, 397

Toolkits, 474, 486Tools for consistent caching, 510Top-level transactions, 598Topological knowledge used in CausalSend,

396Transactional commit protocols, 592Transactional model

compared to virtual synchrony, 588problems encountered in distributed uses,

597weak consistency, 599

Transactional system architectures, 587Transactions, 237

replicated data used for scalability, 605Transportation control, 497Trusted cloud computing, 28Two-phase commit, 326, 592Two-phase locking, 239

UU-Net, 278UDDI, 187, 200UDP protocol

over U-Net, 282Unauthorized use of resources, 298Unintentional threats, 295Universal Description, Discovery and

Integration language (UDDI), 200Universe of things, 76

VVector clock, 321

causal communication with non-membersof a group, 409

timestamp compression, 393used to implement CausalSend, 390

View (of a process group), 381, 516View synchronous multicast delivery, 424Viewstamped Replication, 303Virtual memory used in communication

architecture, 275Virtual private networks, 297, 551Virtual synchrony

applied in cloud settings, 442data replication in cloud caches, 451data replication in first-tier (soft-state)

cloud services, 448execution model, 419hard-state cloud services, 453key-value storage and caches, 452parallel search, 454used to develop new routing services, 455

Virtualization in cloud systems, 175

Page 28: References - rd.springer.com978-1-4471-2416-0/1.pdf · References Abbott, M., Peterson, L.: Increasing network throughput by integrating protocol layers. IEEE/ACM Trans. Netw. 1(5),

730 Index

Virtually synchronous process groups, 513algorithms and tools, 430compared to transactional model, 588execution model, 419extended virtual synchrony, 424flush protocol, 384guarantees compared to synchronous

model, 583in Horus, 516replicated data, 430reporting membership through “views”,

381security, 455, 568summary of membership properties, 385

Virus, 296Vivaldi network coordinates system, 55

WWeakly durable multicast delivery, 374Web proxy, 513Web server

wrapped for fault-tolerance, 489Web servers (replication and load-balancing),

492Web Services, 70, 187, 197, 200

Suggested experimental project, 685White-Pages, 201

Whole file transfer compared with prefetching,224

Wide-area group communication for the Web,492

Windows operating system, 201, 216, 229,481, 499, 597, 625

Worm, 296Wrappers, 474, 481Write-ahead log, 589WS_RELIABILITY standard, 81WS_SECURITY standard, 83

Xx-Kernel, 274, 275, 514, 518, 529X.500, 201XDR, 197XML (Extensible Markup Language, 71

YYellow Pages, 200

ZZipf-like distribution, 153Zookeeper (Yahoo’s

scalable and reliable storage system), vi,26, 165