Abstract:
The security issues that arise in large scale distributed computing are unique in many ways. Both the Legion object system and the Globus tool kit address many of these issues and bring to light the major security obstacles inherent in massively distributed systems that span multiple trust domains. This paper seeks to compare and contrast the material presented in the Globus paper, A security Architecture for Computational Grids, and the Legion paper, A Flexible Security System for Metacomputing Environments.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
This paper gives a short introduction to metacomputing systems. It introduces Globus and Legion to the reader. It explains why security is so important to the use and development of these types of systems. The two main security risks in metacomputing environments are detailed and explained. The paper then explains how the two metacomputing environments it focuses on implement solutions to these security risks in the form of communication and authentication of users. It details the differences and similarities in the security methods of these two system implementations for these two cases. Finally the benefits and drawbacks of the systems are compared.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
This is a technical report that reviews two papers that are about Fault Tolerance issues in Mobile Environments. The first paper reviewed, [2], focuses on a protocol that ensures the commitment of a transaction only once where mobile agents perform transactions. Due to the mobility, an agent can move from one node to another in the distributed system to execute the task it is responsible for. However, unless the movement of the agent is monitored, the transaction can be restarted in more than one node (due to failures) causing it to be committed more than once. Without a doubt, this crashes the reliability of the system. The authors of [2] claim that the protocol they suggest overcome this problem. In the second paper, [3], a scheme to keep track of the recent location of a mobile user is proposed. The scheme includes two variations of an existing forwarding policy. Whenever there is a call to a mobile user to deliv Report
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
The purpose of this paper is to describe the reasons behind and implementation details of the KryptoKnight system. The information contained herein has been obtained from two sources, “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution,” i and “KryptoKnight Authentication and Key Distribution System” ii . This paper will present the reasoning behind the KryptoKnight system, the methods used for its implementation, and the benefits that the system claims to provide over prior encryption systems.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
Cryptography would most certainly not be useful without certification on the Internet. This critical review paper concentrates on the two most commonly used certification techniques used on the Internet - X.509 Certificates and Certification Authorities (CA) and PGP (Pretty Good Privacy). Both of these certification techniques are based on public key cryptography. X.509 implements a directory model whereas PGP implements a referral model. X.509 relies on CAs to provide a trust model whereas PGP gives the user of PGP the autonomy to build a trust model of it's own. There are relative advantages and disadvantages of both these techniques.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
The need for widespread use of encryption technology in the internationally connected computing environment is growing rapidly. There is increasing evidence that older encryption standards such as DES are insufficient to protect confidential data from cracking attempts by professionals, or even dedicated amateurs. Even the integrity of more sophisticated encryption mechanisms is threatened by cracking attempts utilizing special-purpose or massively distributed machines. In the not-too-distant future, the advent of quantum computation threatens to make many current encryption mechanisms easily breakable. An overview of the need for strong encryption is presented, followed by some of the basic terminology used by cryptographers. Past, current, and future encryption mechanisms are described with emphasis on their relative effectiveness.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
Active networks is an exciting area of network research. Many of the topics in active networks also relate to the field of operating systems. This paper presents one approach to active networks and discusses its solution to operating systems issues such as scalability, interoperability, and safety. Secondly, it presents an approach to distributed network management that eliminates the potential for single node failure as well as reduces the network’s management response time to unusual conditions. Lastly, the paper concludes with a discussion about the connection between the two approaches.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
Two distinct systems, both named Eraser are designed to detect data-race conditions be- tween multiple threads. The rst tool uses static checking at compile time in a paral- lel Fortran environment. The second tool us- es dynamic checking at run{time by modify- ing the program binary. This paper describes and analyzes both of these approaches.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
The following paper provides background information regarding C.A.R. Hoare’s Communicating Sequential Processes (CSP), discusses some of the shortcomings of CSP, and focuses on its lack of support for priority. It will discuss C.J. Fidge’s contributions of a formal definition of priority to CSP and will explain some of the affects it had on Ada and occamÔ - two languages based on CSP.
Your can view or download the complete report
(PDF) from the following link.
complete
report
Abstract:
Aspect-Oriented Programming (AOP) provides a new way of separating things in software design and implementation. In AOP, it provides a new software modularity aspects. From the system point of view, the aspect can separate the functionality in well defined layers. In this paper, it presents the basic concepts of AOP with the illustration on how to apply those concepts in a concurrency control system. Additionally, the concept of aspect, which employed in the object-oriented programming to solve synchronization problem is also presented as a comparison.
Your can view or download the complete report
(PDF) from the following link.
complete
report