Abadi and Gordon 1999 |
Abadi, M. and Gordon, A. D. (1999). A calculus
for cryptographic protocols: The spi calculus. Information
and Computation, Vol. 148, No. 1, pp. 1-70, January. http://www.research.microsoft.com/~adg/Publications/spi.ps |
Abadi et al. 1998 |
Abadi, M., Birrell, A.D., Stata, R. and
Wobber, E.P (1998). Secure Web tunneling. In Proceedings
7th International World Wide Web Conference, pp. 531-9.
Elsevier, In Computer Networks and ISDN Systems, Volume
30, Nos. 1-7. http://research.compaq.com/SRC/personal/birrell/tunnel/ |
Abrossimov et al. 1989 |
Abrossimov, V., Rozier, M. and Shapiro,
M. (1989). Generic virtual memory management for operating system
kernels. Proceedings of 12th ACM Symposium on Operating System
Principles, pp. 123-36, December. http://www-sor.inria.fr/publi/GVM_12sosp89.html |
Accetta et al. 1986 |
Accetta, M., Baron, R., Golub, D., Rashid,
R., Tevanian, A. and Young, M. (1986). Mach: A new kernel foundation
for UNIX development. In Proceedings Summer 1986 USENIX Conference
pp. 93-112. |
Adjie-Winoto et al. 1999 |
Adjie-Winoto, W., Schwartz, E., Balakrishnan,
H. and Lilley, J. (1999). The design and implementation of an
intentional naming system. In Proceedings 17th ACM Symposium
on Operating System Principles, published as Operating
Systems Review Vol. 34, No. 5, pp. 186-201. |
Adve and Hill 1990 |
Adve, S. and Hill, M. (1990). Weak ordering
- a new definition. In Proceedings 17th.
Annual Symposium on Computer Architecture, IEEE, pp. 2-14. |
Agrawal et al. 1987 |
Agrawal, D., Bernstein, A., Gupta, P. and
Sengupta, S. (1987). Distributed optimistic concurrency control
with reduced rollback. Distributed Computing Vol. 2:
pp. 45-59. Springer-Verlag. |
Ahamad et al. 1992 |
Ahamad, M., Bazzi, R., John, R., Kohli,
P. and Neiger, G. (1992). The Power of Processor Consistency.
Technical report GIT-CC-92/34, Georgia Institute of Technology,
Atlanta. ftp://ftp.cc.gatech.edu/pub/coc/tech_reports/1992/ |
Anderson 1993 |
Anderson, D.P. (1993). Meta-scheduling for
distributed continuous media. ACM Transactions on Computer
Systems, Vol. 11, No. 3. |
Anderson et al. 1990a |
Anderson, D.P., Herrtwich, R.G. and Schaefer,
C. (1990). SRP - A Resource Reservation Protocol for Guaranteed-Performance
Communication in the Internet. Technical report 90-006,
International Computer Science Institute, Berkeley, Calif. |
Anderson et al. 1990b |
Anderson, D.P., Tzou, S., Wahbe, R., Govindan,
R. and Andrews, M. (1990). Support for continuous media in the
DASH System. Tenth International Conference on Distributed
Computing Systems, Paris. |
Anderson et al. 1991 |
Anderson, T., Bershad, B., Lazowska, E.
and Levy, H. (1991). Scheduler activations: efficient kernel
support for the user-level management of parallelism. In P
roceedings 13th ACM Symposium on Operating System Principles,
pp. 95-109. |
Anderson et al. 1995 |
Anderson, T., Culler, D., Patterson, D.
and the NOW team. (1995). A case for NOW (Networks Of Workstations),
IEEE Micro, Vol. 15, No. 1. |
Anderson et al. 1996 |
Anderson, T.E., Dahlin, M. D., Neefe, J.
M., Patterson, D. A., Roselli, D. S. and Wang, R. Y. (1996).
Serverless Network File Systems. ACM Trans. on Computer Systems
14,1. pp. 41-79. February. http://now.CS.Berkeley.EDU/Papers/Papers/sosp95.ps |
ANSA 1989 |
ANSA (1989). The Advanced Network Systems Architecture
(ANSA) Reference Manual. Castle Hill, Cambridge, England:
Architecture Project Management. |
ANSI 1985 |
American National Standards Institute (1985). American
National Standard for Financial Institution Key Management,
Standard X9.17 (revised). |
Arnold et al. 1999 |
Arnold, K., O'Sullivan, B., Scheifler, R.W., Waldo, J. and
Wollrath, A. (1999). The Jini Specification, Reading,
Mass: Addison-Wesley. http://www.sun.com/jini/specs/index.html |
Attiya and Welch1998 |
Attiya, H., and Welch, J. (1998). Distributed Computing
- Fundamentals, Simulations and Advanced Topics, McGraw-Hill. |
Babaoglu et al. 1998 |
Babaoglu, O., Davoli, R., Montresor, A. and Segala,
R. (1998). System support for partition-aware network applications.
In Proceedings 18th InternationalConference on Distributed
Computing Systems (ICDCS ' 98), pp. 184-191. |
|
Bacon 1998 |
Bacon, J. (1998). Concurrent Systems,
second edition. Wokingham, England: Addison-Wesley. |
|
Baker 1997 |
Baker, S. (1997). CORBA Distributed Objects
Using Orbix, Harlow, England: Addison-Wesley. |
|
Bal et al. 1990 |
Bal, H.E., Kaashoek, M.F. and Tanenbaum, A.S.
(1990). Experience with distributed programming in Orca. In Proceedings
International Conference on Computer Languages '90, IEEE,
pp. 79-89. |
|
Balakrishnan et al. 1995 |
Balakrishnan, H., Seshan, S. and Katz, R.H.
(1995). Improving reliable transport and hand-off performance
in cellular wireless networks. In Proceedings ACM Mobile
Computing and Networking Conference, ACM, pp. 2-11. |
|
Balakrishnan et al. 1996 |
Balakrishnan, H., Padmanabhan, V., Seshan, S.
and Katz, R. (1996). A Comparison of Mechanisms for Improving
TCP Performance over Wireless Links. Proceedings of the ACM
SIGCOMM '96 Conference, pp. 256-69. |
|
Banerjea and Mah 1991 |
Banerjea, A. and Mah, B.A. (1991). The real-time
channel administration protocol. Second International Workshop
on Network and Operating System Support for Digital Audio and
Video, Heidelberg. |
|
Baran 1964 |
Baran, P. (1964). On Distributed Communications.
Research Memorandum RM-3420-PR, Rand Corporation. http://www.rand.org/publications/RM/RM3420/ |
|
Barborak et al. 1993 |
Barborak, M., Malek, M. and Dahbura, A. (1993).
The consensus problem in fault-tolerant computing. ACM Computing
Surveys, Vol. 25, No. 2, pp. 171-220. |
|
Barghouti and Kaiser 1991 |
Barghouti, N.S. and Kaiser G.E. (1991). Concurrency
control in advanced database applications. Computing Surveys,
Vol. 23, No. 3, pp. 269-318. |
|
Bartoli et al. 1993 |
Bartoli, A., Mullender, S.J. and van der Valk,
M. (1993). Wide-address spaces - exploring the design space.
ACM Operating Systems Review, Vol. 27, No. 1, pp. 11-17. |
|
Bates et al. 1996 |
Bates, J., Bacon, J., Moody, K. and Spiteri,
M. (1996). Using events for the scalable federation of heterogeneous
components, European SIGOPS Workshop. |
|
Bell and LaPadula 1975 |
Bell, D.E. and LaPadula, L.J. (1975). Computer
Security Model: Unified Exposition and Multics Interpretation,
Mitre Corporation, 1975. |
|
Bellman 1957 |
Bellman, R.E. (1957). Dynamic Programming.
Princeton, NJ: Princeton University Press. |
|
Bellovin and Merritt 1990 |
Bellovin, S.M. and Merritt, M. (1990). Limitations
of the Kerberos authentication system. ACM Computer Communications
Review, Vol. 20, No. 5, pp. 119-32. |
|
Berners-Lee 1991 |
Berners-Lee, T. (1991). World Wide Web Seminar.
http://www.w3.org/Talks/General.html |
|
Berners-Lee 1999 |
Berners-Lee, T. (1999). Weaving The Web. HarperCollins. |
|
Bernstein et al. 1980 |
Bernstein, P.A., Shipman, D.W. and Rothnie,
J.B. (1980). Concurrency control in a system for distributed
databases (SDD-1). ACM Transactions Database Systems,
Vol. 5, No. 1, pp. 18-51. |
|
Bernstein et al. 1987 |
Bernstein, P., Hadzilacos, V. and Goodman, N.
(1987). Concurrency Control and Recovery in Database Systems.
Reading, Mass.: Addison-Wesley. |
|
Bershad et al. 1990 |
Bershad, B., Anderson, T., Lazowska, E. and
Levy, H. (1990). Lightweight remote procedure call. ACM Transactions
Computer Systems, Vol. 8, No. 1, pp. 37-55. |
|
Bershad et al. 1991 |
Bershad, B., Anderson, T., Lazowska, E. and
Levy, H. (1991). User-level interprocess communication for shared
memory multiprocessors. ACM Transactions Computer Systems,
Vol. 9, No. 2, pp. 175-198. |
|
Bershad et al. 1993 |
Bershad, B., Zekauskas, M. and Sawdon, W. (1993).
The Midway distributed shared memory system. In Proceedings
IEEE COMPCON Conference, IEEE, pp. 528-37. |
|
Bershad et al. 1995 |
Bershad, B., Savage, S., Pardyak, P., Sirer,
E., Fiuczynski, M., Becker, D., Chambers, C. and Eggers, S. (1995).
Safety and performance in the SPIN operating system. Proceedings
of the 15th ACM Symposium on Operating Systems Principles,
pp. 267-84. |
|
Bhatti and Friedrich 1999 |
Bhatti, N. and Friedrich, R. (1999). Web
Server Support for Tiered Services. Hewlett-Packard
Corporation Technical Report HPL-1999-160. |
|
Birman 1993 |
Birman, K.P. (1993). The process group approach
to reliable distributed computing. Comms. ACM, Vol.
36, No. 12, pp. 36-53. |
|
Birman 1996 |
Birman, K.P.(1996). Building Secure and
Reliable Network Applications. Greenwich, CT: Manning. |
|
Birman and Joseph 1987a |
Birman, K.P. and Joseph, T.A. (1987). Reliable
communication in the presence of failures. ACM Transactions
Computer Systems, Vol. 5, No. 1, pp. 47-76. |
|
Birman and Joseph 1987b |
Birman, K., and Joseph, T. (1987). Exploiting
virtual synchrony in distributed systems. In Proceedings
11th ACM Symposium on Operating Systems Principles, pp.
123-38. |
|
Birman et al. 1991 |
Birman, K.P., Schiper, A. and Stephenson, P.
(1991). Lightweight causal and atomic group multicast. ACM
Transactions Computer Systems, Vol. 9, No. 3, pp. 272-314. |
|
Birrell et al. 1995 |
Birrell, A., Nelson, G. and Owicki, S. (1993).
Network objects. In Proceedings 14th ACM Symposium on Operating
Systems Principle s, pp. 217-30. |
|
Birrell and Needham 1980 |
Birrell, A.D. and Needham, R.M. (1980). A universal
file server. IEEE Transactions Software Engineering,
Vol. SE-6, No. 5, pp. 450-3. |
|
Birrell and Nelson 1984 |
Birrell, A.D. and Nelson, B.J. (1984). Implementing
remote procedure calls. ACM Transactions Computer Systems,
Vol. 2, pp. 39-59. |
|
Birrell et al. 1982 |
Birrell, A.D., Levin, R., Needham, R.M. and
Schroeder, M.D. (1982). Grapevine: an exercise in distributed
computing. Comms. ACM, Vol. 25, No. 4, pp. 260-73. |
|
Bisiani and Forin 1988 |
Bisiani, R. and Forin, A. (1988). Multilanguage
parallel programming of heterogeneous machines. IEEE Transactions
Computers, Vol. 37, No. 8, pp. 930-45. |
|
Bisiani and Ravishankar 1990 |
Bisiani, R. and Ravishankar, M. (1990). Plus:
a distributed shared memory system. In Proceedings 17th International
Symposium on Computer Architecture, pp. 115-24. |
|
Black 1990 |
Black, D. (1990). Scheduling support for concurrency
and parallelism in the Mach operating system, IEEE Computer,
Vol. 23, No. 5, pp. 35-43. |
|
Black and Artsy 1990 |
Black, A. and Artsy, Y. (1990). Implementing
location independent invocation, IEEE Transactions Parallel
and Distributed Systems, Vol. 1, No. 1. |
|
Blair and Stefani 1997 |
Blair, G.S. and Stefani, J.-B. (1997). Open
Distributed Processing and Multimedia. Harlow, England:
Addison-Wesley. |
|
Blakley 1999 |
Blakley, R. (1999). CORBA Security - An
Introduction to Safe Computing with Objects. Reading, Mass.:
Addison-Wesley. |
|
Bolosky et al. 1996 |
Bolosky, W., Barrera, J., Draves, R., Fitzgerald,
R., Gibson, G., Jones, M., Levi, S., Myhrvold, N. and Rashid,
R. (1996). The Tiger video fileserver, 6th NOSSDAV Conference,
Zushi, Japan, April. http://www.research.microsoft.com/~bolosky/papers/ |
|
Bolosky et al. 1997 |
Bolosky, W., Fitzgerald, R. and Douceur, J.
(1997). Distributed schedule management in the Tiger video fileserver,
16th ACM Symposium on Operating System Principles, pp.
212-23, St. Malo, France, October. http://www.research.microsoft.com/~bolosky/papers/ |
|
Bonnaire et al. 1995 |
Bonnaire, X., Baggio, A. and Prun, D. (1995).
Intrusion free monitoring: an observation engine for message
server based applications. In Proceedings of the 10th International
Symposium on Computer and Information Sciences (ISCIS X),
pp. 541-48. |
|
Borenstein and Freed 1993 |
Borenstein, N. and Freed, N., (1993). MIME
(Multipurpose Internet Mail Extensions) Part One: Mechanisms
for Specifying and Describing the Format of Internet Message
Bodies. September. Internet RFC 1521. http://www.ietf.org/rfc/rfc1521 |
|
Bowman et al. 1990 |
Bowman, M., Peterson, L. and Yeatts, A. (1990).
Univers: an attribute-based name server. Software-Practice
and Experience, Vol. 20, No. 4, pp. 403-24. |
|
Box 1998 |
Box, D. (1998). Essential COM. Reading,
Mass: Addison-Wesley. |
|
Boykin et al. 1993 |
Boykin, J., Kirschen, D., Langerman, A. and
LoVerso, S. (1993). Programming under Mach. Reading,
Mass.: Addison-Wesley. |
|
Buford 1994 |
Buford, J.K. (1994). Multimedia Systems. Addison-Wesley. |
|
Burns and Wellings 1998 |
Burns, A. and Wellings, A. (1998). Concurrency
in Ada, Cambridge University Press. |
|
Burrows et al. 1989 |
Burrows, M., Abadi, M. and Needham, R. (1989).
A logic of authentication. Technical Report 39,
Palo Alto, Calif.: Digital Equipment Corporation Systems Research
Center. |
|
Burrows et al. 1990 |
Burrows, M., Abadi, M. and Needham, R. (1990).
A logic of authentication. ACM Transactions Computer Systems,
Vol. 8, pp. 18-36. |
|
Bush 1945 |
Bush, V. (1945). As we may think. The Atlantic
Monthly, July. http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm |
|
Callaghan 1996a |
Callaghan, B. (1996). WebNFS Client Specification,
Internet RFC 2054, October. http://www.ietf.org/rfc/rfc2054 |
Callaghan 1996b |
Callaghan, B. (1996). WebNFS Server Specification,
Internet RFC 2055, October. http://www.ietf.org/rfc/rfc2055 |
Callaghan 1999 |
Callaghan, B. (1999). NFS Illustrated, Reading, Mass.: Addison-Wesley. |
Callaghan et al. 1995 |
Callaghan, B., Pawlowski, B. and Staubach, P. (1995). NFS
Version 3 Protocol Specification, Internet RFC 1813, Sun
Microsystems, June. http://www.ietf.org/rfc/rfc1813 |
Campbell 1997 |
Campbell, R. (1997). Managing AFS: The Andrew File System,
Prentice-Hall. |
Campbell et al. 1993 |
Campbell, R., Islam, N., Raila, D. and Madany, P. (1993).
Designing and implementing Choices: an object-oriented system
in C++. Comms. ACM, Vol. 36, No. 9, pp. 117-26. |
Canetti and Rabin 1993 |
Canetti, R. and Rabin, T. (1993). Fast asynchronous byzantine
agreement with optimal resilience.In Proceedings 25th ACM
Symposium on Theory of Computing, pp. 42-51. |
Carriero and Gelernter 1989 |
Carriero, N. and Gelernter, D. (1989). Linda in context.
Comms. ACM, Vol. 32, No. 4, pp. 444-58. |
Carter et al. 1991 |
Carter, J.B., Bennett, J.K. and Zwaenepoel, W. (1991). Implementation
and performance of Munin. In Proceedings 13th ACM Symposium
on Operating System Principles, pp. 152-64. |
Carter et al. 1998 |
Carter, J., Ranganathan, A. and Susarla, S. (1998). Khazana,
An Infrastructure for Building Distributed Services, In Proceedings
of ICDCS '98, Amsterdam, The Netherlands. http://www.cs.utah.edu/khazana/ |
CCITT 1988a |
CCITT (1988). Recommendation X.500 : The Directory
- Overview of Concepts, Models and Service. International
Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland. |
CCITT 1988b |
CCITT (1988). Recommendation X.509: The Directory - Authentication
Framework. International Telecommunications Union, Place
des Nations, 1211 Geneva, Switzerland. |
CCITT 1990 |
CCITT (1990). Recommendation I.150 : B-ISDN
ATM Functional Characteristics. International Telecommunications
Union, Place des Nations, 1211 Geneva, Switzerland. |
Ceri and Owicki 1982 |
Ceri, S. and Owicki, S. (1982). On the use of optimistic
methods for concurrency control in distributed databases. In
Proceedings 6th Berkeley Workshop on Distributed Data Management
and Computer Networks, Berkeley,Calif. pp. 117-30. |
Ceri and Pelagatti 1985 |
Ceri, S. and Pelagatti, G. (1985). Distributed Databases
- Principles and Systems. McGraw-Hill. |
Chandra and Toueg 1996 |
Chandra, T. and Toueg, S. (1996). Unreliable failure detectors
for reliable distributed systems. Journal of the ACM,
Apr., pp. 374-82. |
Chandy and Lamport 1985 |
Chandy, K. and Lamport, L. (1985). Distributed snapshots:
determining global states of distributed systems. ACM Transactions
on Computer Systems, Vol. 3, No. 1, pp. 63-75. |
Chang and Maxemchuk 1984 |
Chang, J. and Maxemchuk, N. (1984). Reliable Broadcast Protocols,
ACM Transactions on Computer Systems. Vol. 2. No. 3.
pp. 251-75. |
Chang and Roberts 1979 |
Chang, E.G. and Roberts, R. (1979). An improved algorithm
for decentralized extrema-finding in circular configurations
of processors. Comms. ACM, Vol. 22, No. 5, pp. 281-3. |
Charron-Bost 1991 |
Charron-Bost, B. (1991). Concerning the size of logical clocks
in distributed systems. Information Processing Letter
s, Vol. 39, July, pp. 11-16. |
Chen et al. 1994 |
Chen, P., Lee, E., Gibson, G., Katz, R. and Patterson, D.
(1994). RAID: High-Performance, Reliable Secondary Storage. ACM
Computing Surveys, Vol. 26, No. 2, June, pp. 145-188. |
Cheng 1998 |
Cheng, C.K. (1998). A survey of media servers. Hong
Kong University CSIS, November, http://www.csis.hku.hk/~ckcheng/papers/video.ps |
Cheriton 1984 |
Cheriton, D.R. (1984). The V kernel: a software base for
distributed systems. IEEE Software, Vol. 1 No. 2, pp.
19-42. |
Cheriton 1985 |
Cheriton, D.R. (1985). Preliminary thoughts on problem-oriented
shared memory: a decentralized approach to distributed systems.
ACM Operating Systems Review, Vol. 19, No. 4, pp. 26-33. |
Cheriton 1986 |
Cheriton, D.R. (1986). VMTP: A protocol for the next generation
of communication systems.In Proceedings SIGCOMM '86 Symposium
on Communication Architectures and Protocols, ACM, pp. 406-15. |
Cheriton and Mann 1989 |
Cheriton, D. and Mann, T. (1989). Decentralizing a global
naming service for improved performance and fault tolerance.
ACM Transactions Computer Systems, Vol. 7, No. 2, pp.
147-83. |
Cheriton and Skeen 1993 |
Cheriton, D. and Skeen, D. (1993). Understanding the limitations
of causally and totally ordered communication. In Proceedings
14th ACM Symposium on Operating System Principles, Dec.,
pp. 44-57. |
Cheriton and Zwaenepoel 1985 |
Cheriton, D.R. and Zwaenepoel, W. (1985). Distributed process
groups in the V kernel. ACM Transactions Computer Systems,
Vol. 3, No. 2, pp. 77-107. |
Cheswick and Bellovin 1994 |
Cheswick, E.R. and Bellovin, S.M. (1994). Firewalls and
Internet Security. Reading, Mass.: Addison-Wesley. |
Choudhary et al. 1989 |
Choudhary, A., Kohler, W., Stankovic, J. and Towsley, D.
(1989). A modified priority based probe algorithm for distributed
deadlock detection and resolution. IEEE Transactions Software
Engineering, Vol. 15, No. 1. |
Clark 1982 |
Clark, D.D. (1982). Window and Acknowledgement Strategy
in TCP, Internet RFC 813. http://www.ietf.org/rfc/rfc813 |
Comer 1991 |
Comer, D.E. (1991). Internetworking with TCP/IP, Volume
1: Principles, Protocols and Architecture. second edition.
Englewood Cliffs, NJ: Prentice-Hall. |
Comer 1995 |
Comer, D.E. (1995). The Internet Book. Englewood
Cliffs, NJ. Prentice-Hall. |
Condict et al. 1994 |
Condict, M., Bolinger, D., McManus, E., Mitchell, D. and
Lewontin, S. (1994). Microkernel modularity with integrated
kernel performance. Technical report, OSF Research Institute,
Cambridge, Mass, April. |
Coulouris et al. 1998 |
Coulouris, G.F., Dollimore, J. B. and Roberts, M.(1998).
Role and task-based access control in the PerDiS groupware platform.
Third ACM Workshop on Role-Based Access Control, George
Mason University, Washington DC, October 22-23. http://www.perdis.esprit.ec.org/papers/ |
Cristian 1989 |
Cristian, F. (1989). Probabilistic clock synchronization.
Distributed Computing, Vol. 3, pp. 146-58. |
Cristian 1991a |
Cristian, F. (1991). Understanding fault-tolerant distributed
systems. Comms. ACM, Vol. 34, No. 2. |
Cristian 1991b |
Cristian, F. (1991). Reaching agreement on processor group
membership in synchronous distributed systems. Distributed
Computing, Springer Verlag, Vol. 4, pp 175-87. |
Cristian and Fetzer 1994 |
Cristian, F., and Fetzer, C. (1994). Probabilistic Internal
Clock Synchronization. In Proceedings 13th Symposium on Reliable
Distributed Systems, IEEE Computer Society Press, October
25-27, pp. 22-31. |
Crow et al. 1997 |
Crow, B., Widjaja, I., Kim, J. and Sakai, P. (1997). IEEE
802.11 Wireless local area networks. IEEE Communications
Magazine, Sept. 1997, pp. 116-26. |
cryptography.org |
North American Cryptography Archives. http://cryptography.org/ |
Curtin and Dolske 1998 |
Kurtin, M. and Dolski, J. (1998). A brute force search of
DES Keyspace. ;login: - the Newsletter of the USENIX Association,
May. http://www.interhack.net/pubs/des-key-crack/ |
Custer 1998 |
Custer, H. (1998). Inside Windows NT, second edition.
Microsoft Press. |
Czerwinski et al. 1999 |
Czerwinski, S., Zhao, B., Hodes, T., Joseph, A. and Katz,
R. (1999). An architecture for a secure discovery service. In
Proceedings Fifth Annual International Conference on Mobile
Computing and Networks. |
Dasgupta et al. 1991 |
Dasgupta, P., LeBlanc Jr., R.J. Ahamad, M. and
Ramachandran, U. (1991). The Clouds distributed operating system.
IEEE Computer, Vol. 24, No. 11, pp. 34-44. |
Davidson 1984 |
Davidson, S.B. (1984). Optimism and consistency in partitioned
database systems. ACM Transactions Database Systems,
Vol. 9, No. 3, pp. 456-81. |
Davidson et al. 1985 |
Davidson, S.B., Garcia-Molina, H. and Skeen, D. (1985). Consistency
in partitioned networks. Computing Surveys, Vol. 17,
No.3, pp. 341-70. |
DEC 1990 |
Digital Equipment Corporation. (1990). In Memoriam: J.
C. R. Licklider 1915-1990, Technical Report 61, DEC Systems
Research Center. http://gatekeeper.dec.com/pub/DEC/SRC/research-reports/abstracts/src-rr-061.html |
Delgrossi et al. 1993 |
Delgrossi, L., Halstrick, C., Hehmann, D., Herrtwich, R.G.,
Krone, O., Sandvoss, J. and Vogt, C. (1993). Media scaling for
audiovisual communication with the Heidelberg transport system.
ACM Multimedia ' 93, Anaheim, Calif. |
Demers et al. 1989 |
Demers, A., Keshav, S., Shenker, S. (1989). Analysis and
simulation of a fair queueing algorithm. ACM SIGCOMM '
89. |
Denning and Denning 1977 |
Denning, D. and Denning, P. (1977). Certification of programs
for secure information flow. Comms. ACM, Vol. 20, No.
7, pp. 504-13. |
Dertouzos 1974 |
Dertouzos, M.L. (1974). Control robotics - the procedural
control of physical processes. IFIP Congress. |
Dierks and Allen 1999 |
Dierks,T. and Allen, C. (1999). The TLS Protocol Version
1.0, Internet RFC 2246. http://www.ietf.org/rfc/rfc2246 |
Diffie 1988 |
Diffie, W. (1988). The first ten years of public-key cryptography.
Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp.
560-77. |
Diffie and Hellman 1976 |
Diffie, W. and Hellman, M.E. (1976). New directions in cryptography.
IEEE Transactions Information Theory, Vol. IT-22, pp.
644-54. |
Diffie and Landau 1998 |
Kahn, D. and Landau, S. (1998). Privacy on the Line.
Cambridge, Mass: MIT Press. |
Dijkstra 1959 |
Dijkstra, E.W. (1959). A note on two problems in connection
with graphs. Numerische Mathematic, Vol. 1, pp. 269-71. |
Dolev and Malki 1996 |
Dolev, D. and Malki, D. (1996). The Transis approach to high
availability cluster communication. Comms. ACM, Vol.
39, No. 4, pp. 64-70. |
Dolev and Strong 1983 |
Dolev, D. and Strong, H. (1983). Authenticated algorithms
for byzantine agreement. SIAM Journal of Computing,
Vol. 12, No. 4, pp. 656-66. |
Dolev et al. 1986 |
Dolev, D., Halpern, J., and Strong, H. (1986). On the possibility
and impossibility of achieving clock synchronization. Journal
of Computing Systems Science 32, 2 (Apr.), pp. 230-50. |
Dorcey 1995 |
Dorcey, T. (1995) CU-SeeMe Desktop Video Conferencing Software,
Connexions, vol. 9, no. 3 (March). |
Douceur and Bolosky 1999 |
Douceur, J.R. and Bolosky, W. (1999). Improving responsiveness
of a stripe-scheduled media server. SPIE Proceedings,
Vol. 3654. Multimedia Computing and Networking. pp.
192-203. http://www.research.microsoft.com/~bolosky/papers/thrifty/mmcn99.ps |
Douglis and Ousterhout 1991 |
Douglis, F. and Ousterhout, J. (1991). Transparent process
migration: design alternatives and the Sprite implementation,
Software - Practice and Experience, Vol. 21, No. 8,
pp. 757-89. |
Draves 1990 |
Draves, R. (1990). A revised IPC interface, In Proceedings
USENIX Mach Workshop, pp. 101-21, October. |
Draves et al. 1989 |
Draves, R.P., Jones, M.B. and Thompson, M.R. (1989).
MIG - the Mach Interface Generator. Technical Report,
Dept. of Computer Science, Carnegie-Mellon University. |
Druschel and Peterson 1993 |
Druschel, P. and Peterson, L. (1993). Fbufs: a high-bandwidth
cross-domain transfer facility. In Proceedings 14th ACM Symposium
on Operating System Principles, pp. 189-202. |
Dubois et al. 1988 |
Dubois, M., Scheurich, C. and Briggs, F.A. (1988). Synchronization,
coherence and event ordering in multiprocessors. IEEE Computer,
Vol. 21, No. 2, pp. 9-21. |
Dwork et al. 1988 |
Dwork, C., Lynch, N. and Stockmeyer, L. (1988). Consensus
in the presence of partial synchrony. Journal of the ACM,
Vol. 35, No. 2, pp. 288-323. |
Farley 1998 |
Farley, J. (1998). Java Distributed Computing.
Cambridge, Mass: O'Reilly. |
Farrow 2000 |
Farrow, R. (2000). Distributed denial of service attacks
- how Amazon, Yahoo, eBay and others were brought down. Network
Magazine, April. http://www.networkmagazine.com/ddos_special.htm |
Ferrari and Verma 1990 |
Ferrari, D. and Verma, D. (1990). A scheme for real-time
channel establishment in wide-area networks. IEEE Journal
on Selected Areas in Communications, Vol. 8, No. 4. |
Ferreira et al. 2000 |
Ferreira, P., Shapiro, M., Blondel, X., Fambon, O., Garcia,
J., Kloostermann, S., Richer, N., Roberts, M., Sandakly, F.,
Coulouris, G., Dollimore, J., Guedes, P., Hagimont, D. and Krakowiak,
S. (2000). PerDiS: Design, Implementation, and Use of a PERsistent
DIstributed Store. In LNCS 1752: Advances in Distributed
Systems. Springer-Verlag Berlin, Heidelberg, New York. pp
427-53. http://www.perdis.esprit.ec.org/papers/ |
Fidge 1991 |
Fidge, C. (1991). Logical Time in Distributed Computing Systems.
IEEE Computer, Vol. 24, No. 8, pp. 28-33. |
Fielding et al. 1999 |
Fielding, R., Gettys, J., Mogul, J. C., Frystyk, H., Masinter,
L., Leach, P. and Berners-Lee T. (1999). Hypertext Transfer
Protocol - HTTP/1.1. Internet RFC 2616. http://www.ietf.org/rfc/rfc2616 |
Fischer 1983 |
Fischer, M. (1983). The Consensus Problem in Unreliable Distributed
Systems (a Brief Survey). In M. Karpinsky, ed., Foundations
of Computation Theory, Vol. 158 of Lecture Notes in
Computer Science, Springer-Verlag, pp. 127-140. Yale University
Technical Report YALEU/DCS/TR-273. |
Fischer and Lynch 1982 |
Fischer, M. and Lynch, N. (1982). A lower bound for the time
to assure interactive consistency. Inf. Process. Letters,
Vol. 14, No. 4, June, pp. 183-6. |
Fischer and Michael 1982 |
Fischer, M.J. and Michael, A. (1982). Sacrificing Serializability
to Attain High Availability of Data in an Unreliable Network.
In Proceedings Symposium on Principles of Database Systems,
ACM, pp. 70-5. |
Fischer et al. 1985 |
Fischer, M., Lynch, N. and Paterson, M. (1985). Impossibility
of distributed consensus with one faulty process. Journal
of the ACM, Vol. 32, No. 2, Apr., pp. 374-82. |
Fitzgerald and Rashid 1986 |
Fitzgerald, R. and Rashid, R.F. (1986). The integration of
virtual memory management and interprocess communication in Accent.
ACM Transactions Computer Systems, Vol. 4, No. 2, pp.
147-77. |
Flanagan 1997 |
Flanagan, D. (1997). Java in a Nutshell. Cambridge,
England: O'Reilly. |
Fleisch and Popek 1989 |
Fleisch, B. and Popek, G. (1989). Mirage: a coherent distributed
shared memory design. In Proceedings 12th ACM Symposium on
Operating System Principles, December, pp. 211-23. |
Floyd 1986 |
Floyd, R. (1986). Short term file reference patterns
in a UNIX environment. Technical Rep. TR 177, Rochester,
NY: Dept. of Computer Science, University of Rochester. |
Floyd and Johnson 1993 |
Floyd, S. and Jacobson, V. (1993). The Synchronization of
Periodic Routing Messages. ACM Sigcomm '93 Symposium. |
Floyd et al. 1997 |
Floyd, S., Jacobson, V., Liu, C., McCanne, S. and Zhang,
L. (1997). A Reliable Multicast Framework for Lightweight Sessions
and Application Level Framing. IEEE/ACM Transactions on Networking,
Vol. 5, No. 6, pp. 784-803. |
Ford and Fulkerson 1962 |
Ford, L.R. and Fulkerson, D.R. (1962). Flows in Networks.
Princeton, NJ: Princeton University Press. |
Fox et al. 1997 |
Fox, A., Gribble, S., Chawathe, Y., Brewer, E. and Gauthier,
P. (1997). Cluster-based scalable network services. Proceedings
of the 16th ACM Symposium on Operating Systems Principles,
pp. 78-91. |
Garay and Moses 1993 |
Garay, J., and Moses, Y. (1993). Fully polynomial Byzantine
agreement in t +1 rounds. In Proceedings 25th ACM
symposium on theory of computing, ACM Press, pp. 31-41,
May. |
Garcia-Molina 1982 |
Garcia-Molina, H. (1982). Elections in Distributed Computer
Systems. IEEE Transactions on Computers, Vol. C-31,
No. 1, pp. 48-59. |
Garcia-Molina and Spauster 1991 |
Garcia-Molina, H. and Spauster, A. (1991). Ordered and Reliable
Multicast Communication. ACM Transactions Computer Systems,
Vol. 9, No. 3, pp. 242-71. |
Garfinkel 1994 |
Garfinkel, S. (1994). PGP: Pretty Good Privacy,
O'Reilly. |
Gharachorloo et al. 1990 |
Gharachorloo, K., Lenoski, D., Laudon, J., Gibbons, P., Gupta,
A. and Hennessy, J. (1990). Memory Consistency and Event Ordering
in Scalable Shared-Memory Multiprocessors. In Proceedings
17th. Annual International Symposium on Computer Architecture,
May, pp. 15-26. |
Gibbs and Tsichritzis 1994 |
Gibbs, S.J. and Tsichritzis, D.C. (1994). Multimedia
Programming. Addison-Wesley. |
Gifford 1979 |
Gifford, D.K. (1979). Weighted voting for replicated data.
In Proceedings 7th Symposium on Operating Systems Principles,
ACM, pp. 150-62. |
Glassman et al. 1995 |
Glassman, S., Manasse, M., Abadi, M., Gauthier, P. and Sobalvarro,
P. (1995). The Millicent Protocol for Inexpensive Electronic
Commerce. Fourth International WWW Conference, December.
http://www.millicent.com/works/details/papers/millicent-w3c4/millicent.html |
Gokhale and Schmidt 1996 |
Gokhale, A. and Schmidt, D. (1996). Measuring the Performance
of Communication Middleware on High-Speed Networks. Proceedings
of SIGCOMM '96, ACM, pp. 306-17. |
Golding and Long 1993 |
Golding, R. and Long, D. (1993). Modeling replica divergence
in a weak-consistency protocol for global-scale distributed databases.
Technical report UCSC-CRL-93-09, Computer and Information
Sciences Board, University of California, Santa Cruz. |
Gong 1989 |
Gong, L. (1989). A Secure Identity-Based Capability System.
In Proceedings of the IEEE Symposium on Security and Privacy,
Oakland, Calif., May, pp.56-63. http://java.sun.com/people/gong/papers/pubs90.html |
Goodman 1989 |
Goodman, J. (1989). Cache Consistency and Sequential
Consistency. Technical Report 61, SCI Committee. |
Gordon 1984 |
Gordon, J. (1984). The Story of Alice and Bob. http://www.conceptlabs.co.uk/alicebob.html |
Govindan and Anderson 1991 |
Govindan, R. and Anderson, D.P. (1991). Scheduling and IPC
Mechanisms for Continuous Media. ACM Operating Systems Review,
Vol. 25, No. 5, pp. 68-80. |
Gray 1978 |
Gray, J. (1978). Notes on database operating systems. In
Operating Systems: an Advanced Course. Lecture Notes
in Computer Science, Vol. 60, pp. 394-481, Springer-Verlag. |
Guerraoui et al. 1998 |
Guerraoui, R., Felber, P., Garbinato, B. and Mazouni, K.
(1998). System support for object groups. In Proceedings
of the ACM Conference on Object Oriented Programming Systems,
Languages and Applications (OOPSLA'98). |
Gusella and Zatti 1989 |
Gusella, R. and Zatti, S. (1989). The accuracy of clock synchronization
achieved by TEMPO in Berkeley UNIX 4.3BSD. IEEE Transactions
Software Engineering, Vol. 15, pp. 847-53. |
Guttman 1999 |
Guttman, E. (1999). Service Loocation Protocol: Automatic
Discovery of IP Network Services. IEEE Internet Computing,
Vol. 3, No. 4, pp. 71-80. |
Hadzilacos and Toueg 1994 |
Hadzilacos, V. and Toueg, S. (1994). A Modular Approach
to Fault-tolerant Broadcasts and Related Problems, Technical
report, Dept. of Computer Science, University of Toronto. |
Härder 1984 |
Härder, T. (1984). Observations on Optimistic Concurrency
Control Schemes. Information Systems, Vol. 9, No. 2,
pp. 111-20. |
Härder and Reuter 1983 |
Härder, T. and Reuter, A. (1983). Principles of Transaction-Oriented
Database Recovery. Computing Surveys, Vol. 15, No. 4. |
Härtig et al. 1997 |
Härtig, H., Hohmuth, M., Liedtke, J., Schönberg,
S., and Wolter, J. (1997). The performance of kernel-based systems.
In Proceedings 16th ACM Symposium on Operating System Principles,
pp. 66-77. |
Hartman and Ousterhout 1995 |
Hartman, J. and Ousterhout, J. (1995). The Zebra Striped
Network File System. ACM Trans. on Computer Systems,
Vol. 13, No. 3, August, pp. 274-310. |
Hayton et al. 1998 |
Hayton R., Bacon J. and Moody K. (1998). OASIS: Access Control
in an Open, Distributed Environment, In Proceedings IEEE
Symposium on Security and Privacy, Oakland, Calif., pp3-14,
May. http://www.cl.cam.ac.uk/Research/SRG/opera/publications/index.html |
Hedrick 1988 |
Hedrick, R. (1988). Routing Information Protocol,
Internet RFC 1058. http://www.ietf.org/rfc/rfc1058 |
Henning 1998 |
Henning, M. (1998). Binding, Migration and Scalability in
CORBA, Comms. ACM, October, Vol. 41, No. 10. pp. 62-71. |
Henning and Vinoski 1999 |
Henning, M. and Vinoski, S. (1999). Advanced CORBA Programming
with C++. Reading, Mass.: Addison-Wesley. |
Herlihy 1986 |
Herlihy, M. (1986). A Quorum-Consensus Replication Method
for Abstract Data Types. ACM Transactions Computer Systems,
Vol. 4, No. 1, pp. 32-53. |
Herlihy and Wing 1990 |
Herlihy, M. and Wing, J. (1990). On Linearizability: a correctness
condition for concurrent objects. ACM Transactions on programming
languages and systems, Vol. 12, No. 3, (July), pp. 463-92. |
Herrtwich 1995 |
Herrtwich, R.G. (1995). Achieving Quality of Service for
Multimedia Applications. ERSADS '95, European Research Seminar
on Advanced Distributed Systems, l'Alpe d'Huez, France, April. |
Hirsch 1997 |
Hirsch, F.J. (1997). Introducing SSL and Certificates using
SSLeay. World Wide Web Journal, Vol. 2, No. 3, Summer.
http://www.certco.com/b2b/ssl_change.htm |
Howard et al. 1988 |
Howard, J.H., Kazar, M.L., Menees, S.G, Nichols, D.A., Satyanarayanan,
M., Sidebotham, R.N. and West, M.J. (1988). Scale and Performance
in a Distributed File System. ACM Transactions Computer Systems,
Vol. 6, No. 1, pp. 51-81. |
Huang et al. 2000 |
Huang, A., Ling, B., Barton, J. and Fox, A. (2000). Running
the Web backwards: appliance data services. Proceedings 9th
international World Wide Web conference. http://www9.org/. |
Huitema 1995 |
Huitema, C. (1995). Routing in the Internet. Englewood
Cliffs, NJ: Prentice-Hall. |
Huitema 1998 |
Huitema, C. (1998). IPv6 - the New Internet Protocol.
Upper Saddle River, NJ: Prentice-Hall. |
Hunter and Crawford 1998 |
Hunter, J. and Crawford, W. (1998). Java Servlet Programming,
O'Reilly. |
Hutchinson and Peterson 1991 |
Hutchinson, N. and Peterson, L. (1991). The x-kernel: An
architecture for implementing network protocols. IEEE Transactions
on Software Engineering, Vol. 17, No. 1, pp. 64-76. |
Hutto and Ahamad 1990 |
Hutto, P. and Ahamad, M. (1990). Slow memory: weakening consistency
to enhance concurrency in distributed shared memories. In Proceedings
10th International Conference on Distributed Computer Systems,
IEEE, pp. 302-11. |
Hyman et al. 1991 |
Hyman, J., Lazar, A.A. and Pacifici, G. (1991). MARS - The
MAGNET-II Real-Time Scheduling Algorithm. ACM SlGCOM '
91, Zurich. |
Kaashoek and Tanenbaum 1991 |
Kaashoek, F. and Tanenbaum, A. (1991). Group Communication
in the Amoeba Distributed Operating System. In Proceedings
11th International Conference on Distributed Computer Systems,
pp. 222-30. |
Kaashoek et al. 1989 |
Kaashoek, F., Tanenbaum, A., Flynn Hummel, S. and Bal, H.
(1989). An Efficient Reliable Broadcast Protocol. Operating
Systems Review, Vol. 23, No. 4, pp. 5-20. |
Kaashoek et al. 1997 |
Kaashoek, M., Engler, D., Ganzer, G., Briceño, H.,
Hunt, R., Mazières, D., Pinckney, T., Grimm, R., Jannotti,
J. and Mackenzie, K. (1997). Application performance and flexibility
on exokernel systems. Proceedings of the 16th ACM Symposium
on Operating Systems Principles, pp. 52-65. |
Kahn 1967 |
Kahn, D. (1967). The Codebreakers: The Story of Secret
Writing. New York: Macmillan. |
Kahn 1983 |
Kahn, D. (1983). Kahn on Codes. New York: Macmillan. |
Kahn 1991 |
Kahn, D, (1991). Seizing the Enigma. Boston: Houghton
Mifflin. |
Kehne et al. 1992 |
Kehne, A., Schonwalder, J. and Langendorfer, H. (1992). A
Nonce-based Protocol for Multiple Authentications. ACM Operating
Systems Review, Vol. 26, No. 4, pp. 84-9. |
Keith and Wittle 1993 |
Keith, B.E. and Wittle, M. (1993). LADDIS: The Next Generation
in NFS File Server Benchmarking, Summer USENIX Conference
Proceedings. USENIX Association, Berkeley, CA, June. |
Keleher et al. 1992 |
Keleher, P., Cox, A. and Zwaenepoel, W. (1992). Lazy consistency
for software distributed shared memory. In Proceedings 19th
Annual International Symposium on Computer Architecture.
pp. 13-21, May 1992. |
Kessler and Livny 1989 |
Kessler, R.E. and Livny, M. (1989). An Analysis of Distributed
Shared Memory Algorithms, In Proceedings 9th International
Conference Distributed Computing Systems. IEEE, pp. 98-104. |
Kille 1992 |
Kille, S. (1992). Implementing X.400 and X.500: The PP
and QUIPU Systems. Artech House. |
Kindberg 1995 |
Kindberg, T. (1995). A Sequencing Service for Group Communication
(abstract), In Proceedings 14th annual ACM Symposium on Principles
of Distributed Computing, p. 260. Technical Report No. 698,
Queen Mary and Westfield College Dept. of CS, 1995. ftp://ftp.dcs.qmw.ac.uk/pub/distrib/publications/TR698-Sequencing-Service.ps.gz |
Kindberg et al. 1996 |
Kindberg, T., Coulouris, G., Dollimore, J. and Heikkinen,
J. (1996). Sharing objects over the Internet: the Mushroom approach.
In Proceedings IEEE Global Internet 1996, London,
Nov., pp. 67-71. |
Kistler and Satyanarayanan 1992 |
Kistler, J.J. and Satyanarayanan, M. (1992). Disconnected
Operation in the Coda File System. ACM Transactions on Computer
Systems, Vol. 10, No. 1, pp. 3-25. |
Kleinrock 1961 |
Kleinrock, L. (1961). Information Flow in Large Communication
Networks, MIT, RLE Quarterly Progress Report, July. |
Kleinrock 1997 |
Kleinrock, L. (1997). Nomadicity: anytime, anywhere in a
disconnected world. Mobile Networks and Applications, Vol. 1,
No. 4, pp. 351-7. |
Kohl and Neuman 1993 |
Kohl, J. and Neuman, C. (1993). The Kerberos Network
Authentication Service (V5), Internet RFC 1510, September.
http://www.ietf.org/rfc/rfc1510 |
Konstantas et al. 1997 |
Konstantas, D., Orlarey, Y., Gibbs, S. and Carbonel, O. (1997).
Distributed Music Rehearsal. In Proceedings International
Computer Music Conference 97. http://cuiwww.unige.ch/OSG/publications/TR97/TR97Contents.html |
Kopetz and Verissimo 1993 |
Kopetz, H. and Verissimo, P. (1993). Real Time and Dependability
Concepts. in Mullender ed, Distributed Systems, second
edition, Addison-Wesley. |
Kopetz et al. 1989 |
Kopetz, H. Damm, A., Koza, C., Mulazzani, M., Schwabl, W.
Senft, C and Zainlinger, R. (1989). Distributed Fault-Tolerant
Real-Time Systems - The MARS Approach. IEEE Micro, Vol.
9, No. 1. |
Kshemkalyani and Singhal 1991 |
Kshemkalyani, A. and Singhal, M. (1991). Invariant-Based
Verification of a Distributed Deadlock Detection Algorithm. IEEE
Transactions on Software Engineering, Vol. 17, No. 8. August. |
Kshemkalyani and Singhal 1994 |
Kshemkalyani, A. and Singhal, M. (1994). On Characterisation
and Corrrectness of Distributed Deadlock detection, Journal
of Parallel and Distributed Computing, Vol. 22, pp. 44-59. |
Kung and Robinson 1981 |
Kung, H.T. and Robinson, J.T. (1981). Optimistic methods
for concurrency control. ACM Transactions on Database Systems,
Vol. 6, No. 2, pp. 213-26. |
Kurose and Ross 2000 |
Kurose, J.F. and Ross, K.W. (2000). Computer Networking:
A Top-Down Approach Featuring the Internet, Addison Wesley
Longman. http://gaia.cs.umass.edu/kurose/Contents.htm |
Ladin et al. 1992 |
Ladin, R., Liskov, B., Shrira, L. and Ghemawat, S. (1992).
Providing Availability Using Lazy Replication. ACM Transactions
on Computer Systems, Vol. 10, No. 4, pp. 360-91. |
Lai 1992 |
Lai, X. (1992). On the Design and Security of Block Ciphers,
ETH Series in Information Processing, Vol. 1, Konstanz:
Hartung-Gorre Verlag. |
Lai and Massey 1990 |
Lai, X. and Massey, J. (1990). A proposal for a new Block
Encryption Standard. Advances in Cryptology-Eurocrypt '90
In Proceedings, Springer-Verlag, pp. 389-404. |
Lamport 1978 |
Lamport, L. (1978). Time, clocks and the ordering of events
in a distributed system. Comms. ACM, Vol. 21, No. 7,
pp. 558-65. |
Lamport 1979 |
Lamport, L. (1979). How to Make a Multiprocessor Computer
that Correctly Executes Multiprocess Programs. IEEE Transactions
Computers, Vol. C-28, No. 9, pp. 690-1. |
Lamport 1986 |
Lamport, L. (1986). On interprocess communication, parts
I and II. Distributed Computing, Vol. 1, No. 2, pp.
77-101. |
Lamport et al. 1982 |
Lamport, L., Shostak, R. and Pease, M. (1982). Byzantine
Generals Problem. ACM Transactions Programming Languages
and Systems, Vol. 4, No. 3, pp. 382-401. |
Lampson 1971 |
Lampson, B. (1971). Protection. In Proceedings 5th Princeton
Conference on Information Sciences and Systems, Princeton,
p. 437. Reprinted in ACM Operating Systems Review. Vol.
8, No. 1, January, p. 18. http://www.research.microsoft.com/lampson/Publications.html |
Lampson 1981a |
Lampson, B.W. (1981). Atomic Transactions. In Distributed
systems: Architecture and Implementation. Lecture Notes in Computer
Science 105, pp. 254-9. Berlin: Springer-Verlag. |
Lampson 1986 |
Lampson, B.W. (1986). Designing a Global Name Service.In
Proceedings 5th ACM Symposium Principles of Distributed Computing,
pp. 1-10, August. |
Lampson et al. 1992 |
Lampson, B.W., Abadi, M., Burrows, M. and Wobber, E. (1992).
Authentication in Distributed Systems: Theory and Practice.
ACM Transactions on Computer Systems, Vol. 10, No. 4, pp.
265-310. |
Lea et al. 1993 |
Lea, R., Jacquemot, C. and Pillevesse, E. (1993). COOL: system
support for distributed programming. Comms. ACM, Vol.
36, No. 9, pp. 37-46. |
Leach et al. 1983 |
Leach, P.J., Levine, P.H., Douros, B.P., Hamilton, J.A.,
Nelson, D.L. and Stumpf, B.L. (1983). The architecture of an
integrated local network. IEEE J. Selected Areas in Communications,
Vol. SAC-1, No. 5, pp. 842-56. |
Lee and Thekkath 1996 |
Lee, E.K. and Thekkath, C.A. (1996). Petal: Distributed Virtual
Disks, In Proc. 7th Intl. Conf. on Architectural Support
for Prog. Langs. and Operating Systems, October, pp. 84-96.
ftp://ftp.digital.com/pub/DEC/SRC/publications/eklee/petal-paper.pdf |
Lee et al. 1996 |
Lee C., Rajkumar, R. and Mercer C. (1996). Experiences with
Processor Reservation and Dynamic QOS in Real-Time Mach.
In Proceedings Multimedia Japan '96. |
Leffler et al. 1989 |
Leffler, S., McKusick, M., Karels, M. and Quartermain J.
(1989). The Design and Implementation of the 4.3 BSD UNIX
Operating System. Reading, Mass: Addison-Wesley. |
Leiner 1997 |
Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock,
L., Lynch, D.C., Postel, J., Roberts, L.G. and Wolff, S. (1997).
A Brief History of the Internet, Comms. ACM, Vol. 40,
No. 1, Feb., pp. 102-108. http://www.isoc.org/internet/history/brief.html |
Leland et al. 1993 |
Leland, W. E., Taqqu, M.S., Willinger, W. and Wilson, D.V.
(1993). On the Self-Similar Nature of Ethernet Traffic. ACM
SIGCOMM ' 93, San Francisco. |
Lenoski et al. 1992 |
Lenoski, D., Laudon, J., Gharachorloo, K., Weber, W.D., Gupta,
A., Hennessy, J., Horowitz, M. and Lam, M.S. (1992). The Stanford
Dash multiprocessor. IEEE Computer, Vol. 25, No. 3,
pp. 63-79. |
Leslie et al. 1996 |
Leslie, I., McAuley, D., Black, R., Roscoe, T., Barham, P.,
Evers, D., Fairbairns, R. and Hyden, E. (1996). The design and
implementation of an operating system to support distributed
multimedia applications, ACM Journal of Selected Areas in
Communication, Vol. 14, No. 7, pp. 1280-97. |
Li and Hudak 1989 |
Li, K. and Hudak, P. (1989). Memory Coherence in Shared Virtual
Memory Systems. ACM Transactions on Computer Systems,
Vol. 7, No. 4, pp. 321-59. |
Liedtke 1996 |
Liedtke, J. (1996). Towards real microkernels, Comms.
ACM, Vol. 39, No. 9, pp. 70-7. |
Linux AFS |
The Linux AFS FAQ. http://www.umlug.umd.edu/linuxafs |
Lipton and Sandberg 1988 |
Lipton, R. and Sandberg, J. (1988). PRAM: A scalable
shared memory. Technical Report CS-TR-180-88, Princeton
University. |
Liskov 1988 |
Liskov, B. (1988). Distributed programming in Argus. Comms.
ACM, Vol, 31, No. 3, pp. 300-12. |
Liskov 1993 |
Liskov, B. (1993). Practical uses of synchronized clocks
in distributed systems, Distributed Computing,Vol. 6,
No. 4, pp. 211-19. |
Liskov and Scheifler 1982 |
Liskov, B. and Scheifler, R.W. (1982). Guardians and actions:
linguistic support for robust, distributed programs. ACM
Transactions Programming Languages and Systems, Vol. 5,
No. 3, pp. 381-404. |
Liskov and Shrira 1988 |
Liskov, B. and Shrira, L. (1988). Promises: Linguistic Support
for Efficient Asynchronous Procedure Calls in Distributed Systems.
In Proceedings SIGPLAN '88 Conference Programming Language
Design and Implementation. Atlanta. |
Liskov et al. 1991 |
Liskov, B., Ghemawat, S., Gruber, R., Johnson, P., Shrira,
L., Williams, M. (1991). Replication in the Harp File System.
In Proceedings 13th ACM Symposium on Operating System Principles,
pp. 226-38. |
Liu and Albitz 1998 |
Liu, C. and Albitz, P. (1998). DNS and BIND, third
edition. O'Reilly. |
Liu and Layland 1973 |
Liu, C.L. and Layland, J.W. (1973). Scheduling Algorithms
for Multiprogramming in a Hard Real-Time Environment. Journal
of the ACM, Vol. 20, No. 1. |
Loepere 1991 |
Loepere, K. (1991). Mach 3 Kernel Principles. Open
Software Foundation and Carnegie-Mellon University. |
Lundelius and Lynch 1984 |
Lundelius, J. and Lynch, N. (1984). An Upper and Lower Bound
for Clock Synchronization. Information and Control 62,
2/3 (Aug./Sep.), pp. 190-204. |
Lynch 1996 |
Lynch, N. (1996). Distributed Algorithms, Morgan
Kaufmann. |
Ma 1992 |
Ma, C. (1992). Designing a Universal Name Service.
Technical Report 270, University of Cambridge. |
Macklem 1994 |
Macklem, R. (1994). Not Quite NFS: Soft Cache Consistency
for NFS. Proceedings of the Winter '94 USENIX Conference,
San Francisco, Ca., January, pp. 261-278. http://docs.freebsd.org/44doc/papers/nqnfs.html |
Maekawa 1985 |
Maekawa, M. (1985). A Algorithm for Mutual
Exclusion in Decentralized Systems. ACM Transactions on Computer
System s, Vol. 3, No. 2, pp. 145-159. |
Maffeis 1995 |
Maffeis, S. (1995). Adding group communication and fault
tolerance to CORBA. In Proceedings of the 1995 USENIX conference
on object-oriented technologies. |
Malkin 1993 |
Malkin, G. (1993). RIP Version 2 - Carrying Additional
Information, Internet RFC 1388. http://www.ietf.org/rfc/rfc1388 |
Marsh et al. 1991 |
Marsh, B., Scott, M., LeBlanc, T. and Markatos, E. (1991).
First-class User-level Threads. In Proceedings 13th ACM Symposium
on Operating System Principles, pp. 110-21. |
Marzullo and Neiger 1991 |
Marzullo, K., and Neiger, G. (1991). Detection of global
state predicates, In Proceedings 5th International Workshop
on Distributed Algorithms, Toug, S., Spirakis, P. and Kirousis,
L., eds, Springer-Verlag, pp. 254-72. |
Mattern 1989 |
Mattern, F. (1989). Virtual Time and Global States in Distributed
Systems, In Proceedings Workshop on Parallel and Distributed
Algorithm s. Cosnard, M. et al. (eds), Amsterdam:
North-Holland, pp. 215-26. |
mbone |
MBone Software Archives. ftp://ftp.sunet.se/pub/network/merit-research/mbone/output.html |
McGraw and Felden 1999 |
McGraw, G. and Felden, E. (1999). Securing Java.
John Wiley & Sons. http://www.securingjava.com/ |
Melliar-Smith et al. 1990 |
Melliar-Smith, P., Moser, L. and Agrawala, V. (1990). Broadcast
Protocols for Distributed Systems. IEEE Transactions on Parallel
and Distributed Systems, Vol. 1, No. 1, pp. 17-25. |
Menezes 1993 |
Menezes, A. (1993). Elliptic Curve Public Key Cryptosystems,
Kluwer Academic Publishers. http://www.cacr.math.uwaterloo.ca/hac/ |
Menezes et al. 1997 |
Menezes, A., van Oorschot, O. and Vanstone, S. (1997). Handbook
of Applied Cryptography. CRC Press. http://www.cacr.math.uwaterloo.ca/hac/ |
Metcalfe and Boggs 1976 |
Metcalfe, R.M. and Boggs, D.R. (1976). Ethernet: distributed
packet switching for local computer networks. Comms. ACM,
Vol. 19, pp. 395-403. |
mice.ed.ac.uk |
Handley, M.. The sdr Session Directory. http://mice.ed.ac.uk/mice/archive/sdr.html |
Mills 1995 |
Mills, D. (1995). Improved Algorithms for Synchronizing Computer
Network Clocks, IEEE Transactions Networks, June, pp.
245-54. |
Milojicic et al. 1999 |
Milojicic, J., Douglis, F. and Wheeler, R. (1999). Mobility,
Processes, Computers and Agents, Reading: Addison-Wesley. |
Minnich and Farber 1989 |
Minnich, R. and Farber, D. (1989). The Mether System: a Distributed
Shared Memory for SunOS 4.0. In Proceedings Summer 1989
Usenix Conference. |
Mitchell and Dion 1982 |
Mitchell, J.G. and Dion, J. (1982). A comparison of two network-based
file servers. Comms. ACM, Vol. 25, No. 4, pp. 233-45. |
Mitchell et al. 1992 |
Mitchell, C.J., Piper, F. and Wild, P. (1992). Digital Signatures.
In Contemporary Cryptology. Simmons, G.J. ed., New York:
IEEE Press. |
Mogul 1994 |
Mogul, J.D. (1994). Recovery in Spritely NFS, Computing
Systems, Vol.7, No. 2. |
Mok 1985 |
Mok, A.K. (1985). SARTOR - A Design Environment for Real-Time
Systems. Ninth IEEE COMP-SAC. |
Morin 1997 |
Morin, R. (ed.) (1997). MkLinux: Microkernel Linux for
the Power Macintosh. Prime Time Freeware. |
Morris et al. 1986 |
Morris, J., Satyanarayanan, M., Conner, M.H., Howard, J.H.,
Rosenthal, D.S. and Smith, F.D. (1986). Andrew: a distributed
personal computing environment. Comms. ACM, Vol. 29,
No. 3, pp. 184-201. |
Mosberger 1993 |
Mosberger, D. (1993). Memory Consistency Models.
Technical Report 93/1 1, University of Arizona. |
Moser et al. 1994 |
Moser, L., Amir, Y., Melliar-Smith, P. and Agarwal, D. (1994).
Extended Virtual Synchrony. In Proceedings 14th International
Conference on Distributed Computing Systems, IEEE Computer
Society Press, pp. 56-65. |
Moser et al. 1996 |
Moser, L., Melliar-Smith, P., Agarwal, D., Budhia, R., and
Lingley-Papadopoulos, C. (1996). Totem: a Fault-Tolerant Multicast
Group Communication System. Comms. ACM, Vol. 39, No.
4, pp. 54-63. |
Moser et al. 1998 |
Moser, L., Melliar-Smith, P. and Narasimhan, P. (1998). Consistent
object replication in the Eternal system. Theory and practice
of object systems, Vol. 4, No. 2. |
Moss 1985 |
Moss, E. (1985). Nested Transactions, An Approach to
Reliable Distributed Computing. MIT Press. |
multimedia index |
Gibbs, S. and Szentivanyi, S., Index to Multimedia Information
Sources. http://dutiem.twi.tudelft.nl/projects/MultimediaInfo/ |
Myers and Liskov 1997 |
Myers, A.C. and Liskov, B. (1997). A Decentralized Model
for Information Flow Control, ACM Operating Systems Review,
Vol. 31, No. 5, pp. 129-42, December. |
Nagle 1984 |
Nagle, J. (1984). Congestion Control in TCP/IP Internetworks,
Computer Communications Review, Vol. 14, pp. 11-17, October. |
Nagle 1987 |
Nagle, J. (1987). On Packet Switches with Infinite Storage.
IEEE Transactions on Communications, Vol. 35, No. 4. |
National Bureau of Standards 1977 |
National Bureau of Standards (1977). Data Encryption
Standard (DES). Federal Information Processing Standards
No. 46, Washington DC: US National Bureau of Standards. |
Needham 1993 |
Needham, R. (1993). Names. In Distributed Systems,
an Advanced Course. (Mullender, S., ed.), second Edition.
Wokingham, England: ACM Press/Addison-Wesley. pp. 315-26. |
Needham and Schroeder 1978 |
Needham, R.M. and Schroeder, M.D. (1978). Using encryption
for authentication in large networks of computers. Comms.
ACM, Vol. 21, pp. 993-9. |
Nelson et al. 1988 |
Nelson, M.N., Welch, B.B. and Ousterhout, J.K. (1988). Caching
in the Sprite Network File System, ACM Transactions
on Computer Systems, Vol. 6, No. 1, pp. 134-154. |
Netscape 1996 |
Netscape Corporation (1996). SSL 3.0 Specification.
http://home.netscape.com/eng/ssl3/index.html |
Neuman et al. 1999 |
Neuman, B.C., Tung, B. and Wray, J. (1999). Public Key
Cryptography for Initial Authentication in Kerberos, Internet
Draft ietf-cat-kerberos-pk-init-09, July. http://web.mit.edu/kerberos/www/papers.html |
Neumann and Ts'o 1994 |
Neuman, B.C. and Ts'o, T. (1994). An Authentication Service
for Computer Networks, IEEE Communications, vol. 32, no.
9, pp. 33-38. Sept. http://nii.isi.edu/publications/kerberos-neuman-tso.html |
Nielson et al. 1997 |
Nielsen, H., Gettys, J., Baird-Smith, A., Prud'hommeaux,
E., Lie, H. and Lilley, C. (1997). Network Performance Effects
of HTTP/1.1, CSS1, and PNG. Proceedings SIGCOMM '97. |
NIST 1995 |
National Institute for Standards and Technology (1995). Secure
Hash Standard. NIST FIPS PUP 180-1, US Department of Commerce.
http://www.itl.nist.gov/fipspubs/fip180-1.htm |
NIST 1999 |
National Institute for Standards and Technology (1999). AES
- a Crypto Algorithm for the Twenty-first Century, US Department
of Commerce. http://www.nist.gov/aes |
now.cs.berkeley.edu |
The Berkeley NOW project home page. http://now.cs.berkeley.edu |
Oaks and Wong 1999 |
Oaks, S. and Wong, H. (1999). Jave Threads (second
edition), O'Reilly. |
OMG 1997a |
Object Management Group. (1997). Concurrency Control
Service Specification, Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/97-12-14.pdf |
OMG 1997b |
Object Management Group (1997). Naming Service Specification.
Framingham, Mass: OMG. ftp://www.omg.org/pub/docs/formal/97-12-10.pdf |
OMG 1997c |
Object Management Group (1997). Event Service Specification.
Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/97-12-11.pdf |
OMG 1997d |
Object Management Group (1997). The CORBA IDL Specification.
Framingham, Mass: OMG. http://www.omg.org/corba/cichpter.html |
OMG 1997e |
Object Management Group, (1997). Object Transaction Service
Specification. Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/97-12-17.pdf |
OMG 1998a |
Object Management Group (1998). CORBA/IIOP 2.3.1 Specification.
Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/99-10-07.pdf |
OMG 1998b |
Object Management Group (1998). CORBA Security Service
Specification. Framingham, Mass: OMG. http://www.omg.org/docs/ptc/98-01-02.pdf |
OMG 1998c |
Object Management Group (1998). Notification service
Specification. Framingham, Mass: OMG. Technical report telecom/98-06-15.
f tp://www.omg.org/pub/docs/telecom/98-06-15.pdf |
OMG 1998d |
Object Management Group (1998). CORBA Messaging.
Framingham, Mass:OMG. http://www.omg.org/docs/ptc/98-05-06.pdf |
OMG 1998e |
Object Management Group(1998). Objects by Value.
Framingham, Mass: OMG. http://www.omg.org/docs/ptc/98-01-18.pdf |
Omidyar and Aldridge 1993 |
Omidyar, C.G. and Aldridge, A. (1993). Introduction to SDH/SONET.
IEEE Communications Magazine, Vol. 31, pp. 30-3, Sept. |
Oppen and Dalal 1983 |
Oppen, D. C. and Dalal Y.K. (1983). The Clearinghouse: a
decentralized agent for locating named objects in a distributed
environment. ACM Trans. on Office Systems, Vol. 1, pp.
230-53. |
Orfali et al. 1996 |
Orfali, R., Harkey, D. and Edwards, J. (1996). The Essential
Distributed Objects Survival Guide. New York: Wiley. |
Organick 1972 |
Organick, E.I. (1972). The MULTICS System: An Examination
of its Structure. Cambridge, Mass: MIT Press. |
Orman et al. 1993 |
Orman, H., Menze, E., O'Malley, S. and Peterson, L. (1993).
A fast and general implementation of Mach IPC in a Network. In
Proceedings Third USENIX Mach Conference, April. |
OSF 1997 |
Introduction to OSF DCE. The Open Group.www.opengroup.org |
Ousterhout et al. 1985 |
Ousterhout, J., Da Costa, H., Harrison, D., Kunze, J., Kupfer,
M. and Thompson, J. (1985). A Trace-driven analysis of the UNIX
4.2 BSD file system. In 10th ACM Symposium Operating System
Principles. |
Ousterhout et al. 1988 |
Ousterhout, J., Cherenson, A., Douglis, F., Nelson, M. and
Welch, B. (1988). The Sprite Network Operating System. IEEE
Computer, Vol. 21, No. 2, pp. 23-36. |
Parker 1992 |
Parker, B. (1992). The PPP AppleTalk Control Protocol
(ATCP). Internet RFC 1378. http://www.ietf.org/rfc/rfc1378 |
Parringtom et al. 1995 |
G. D. Parrington, S. K. Shrivastava, Wheater, S.M. and Little,
M. C. (1995). The Design and Implementation of Arjuna, USENIX
Computing Systems Journal, Vol 8, No 3. |
Partridge 1992 |
Partridge, C. (1992). A Proposed Flow Specificatio
n. Internet RFC 1363. http://www.ietf.org/rfc/rfc1363 |
Patterson et al. 1988 |
Patterson, D., Gibson, G and Katz, R. (1988). A Case for
Redundant Arrays of Interactive Disks, ACM International
Conf. on Management of Data (SIGMOD), pp. 109-116, May. |
Pease et al. 1980 |
Pease, M., Shostak, R. and Lamport, L.(1980). Reaching agreement
in the presence of faults. Journal of the ACM, Vol.
27, No. 2, April, pp. 228-34. |
Pedone and Schiper 1999 |
Pedone, F. and Schiper, A. (1999). Generic Broadcast. In
Proceedings of the 13th International Symposium on Distributed
Computing (DISC '99), September. http://lsewww.epfl.ch/Documents/acrobat/PS99c.pdf |
Petersen et al. 1997 |
Petersen, K., Spreitzer, M., Terry, D., Theimer, M. and Demers,
A. (1997). Flexible update propagation for weakly consistent
replication. Proceedings of the 16th ACM Symposium on Operating
Systems Principles, pp. 288-301. |
Peterson 1988 |
Peterson, L. (1988). The Profile Naming Service. ACM
Transactions Computer Systems, Vol. 6, No. 4, pp. 341-64. |
Peterson et al. 1989 |
Peterson, L.L., Buchholz, N.C. and Schlichting, R.D. (1989).
Preserving and Using Context Information in Interprocess Commun
ication. ACM Transactions on Computer Systems, Vol.
7, No. 3, pp. 217-46. |
Pike et al. 1993 |
Pike, R., Presotto, D., Thompson, K., Trickey, H. and Winterbottom,
P. (1993). The Use of Name Spaces in Plan 9. Operating Systems
Review, Vol. 27, No. 2, April 1993, pp. 72-76. http://plan9.bell-labs.com/sys/doc/names.pdf |
Popek and Walker 1985 |
Popek, G. and Walker, B. (eds.). (1985). The LOCUS Distributed
System Architecture. Cambridge Mass: MIT Press. |
Postel 1981a |
Postel, J. (1981). Internet Protocol. Internet
RFC 791. http://www.ietf.org/rfc/rfc791 |
Postel 1981b |
Postel, J. (1981). Transmission Control Protocol.
Internet RFC 793. http://www.ietf.org/rfc/rfc793 |
Powell 1991 |
Powell, D. (ed.) (1991). Delta-4: a Generic Architecture
for Dependable Distributed Computing. Berlin and New York:
Springer-Verlag. |
Preneel et al. 1998 |
Preneel, B., Rijmen, V. and Bosselaers, A. (1998). Recent
developments in the design of conventional cryptographic algorithms,
In Computer Security and Industrial Cryptography, State of
the Art and Evolution, Lecture Notes in Computer Science,
No. 1528, Springer-Verlag, pp. 106-131. http://www.esat.kuleuven.ac.be/~cosicart/pdf/AB-9800.pdf |
privacy.nb.ca |
International Cryptography Freedom. http://privacy.nb.ca/cryptography/crypto-free.htm |
Radia et al. 1993 |
Radia, S., Nelson, M. and Powell, M. (1993). The Spring
Naming Service. Technical Report 93-16, Sun Microsystems
Laboratories, Inc. |
Rashid 1985 |
Rashid, R.F. (1985). Network operating systems. In Local
Area Networks: An Advanced Course, Lecture Notes in Computer
Science, 184, Springer-Verlag, pp. 314-40. |
Rashid 1986 |
Rashid, R.F. (1986). From RIG to Accent to Mach: the evolution
of a network operating system. In Proceedings of the ACM/IEEE
Computer Society Fall Joint Conference, ACM, November. |
Rashid and Robertson 1981 |
Rashid, R. and Robertson, G. (1981). Accent: a communications
oriented network operating system kernel. ACM Operating Systems
Review, Vol. 15, No. 5, pp. 64-75. |
Rashid et al. 1988 |
Rashid, R., Tevanian Jr, A., Young, M., Golub, D., Baron,
R., Black, D., Bolosky, W.J. and Chew, J. (1988). Machine-Independent
Virtual Memory Management for Paged Uniprocessor and Multiprocessor
Architectures. IEEE Transactions Computers, Vol. 37,
No. 8, pp. 896-907. |
Raynal 1988 |
Raynal, M. (1988). Distributed Algorithms and Protocols.
Wiley. |
Raynal 1992 |
Raynal, M. (1992). About Logical Clocks for Distributed Systems.
ACM Operating Systems Review, Vol. 26, No. 1, pp. 41-8. |
Raynal and Singhal 1996 |
Raynal, M. and Singhal, M. (1996). Capturing Causality in
Distributed Systems. IEEE Computer, February, pp. 49-56. |
Redmond 1997 |
Redmond, F.E. (1997). DCOM: Microsoft Distributed Component
Model. IDG Books Worldwide. |
Reed 1983 |
Reed, D.P. (1983). Implementing atomic actions on decentralized
data. ACM Transactions on Computer Systems, Vol. 1,
No. 1, pp. 3-23. |
Ricart and Agrawala 1981 |
Ricart, G. and Agrawala, A.K. (1981). An optimal algorithm
for mutual exclusion in computer networks. Comms. ACM,
Vol. 24, No. 1, pp. 9-17. |
Richardson et al. 1998 |
Richardson, T., Stafford-Fraser,Q., Wood, K.R. and Hopper,
A. (1998). Virtual Network Computing, IEEE Internet Computing.
Vol. 2, No.1, Jan/Feb, pp. 33-8. http://www.uk.research.att.com/vnc/docs.html |
Ritchie 1984 |
Ritchie, D. (1984). A Stream Input Output System. AT&T
Bell Laboratories Technical Journal, Vol. 63, No. 8, pt.
2, pp. 1897-910. |
Rivest 1992 |
Rivest, R. (1992). The MD5 Message-Digest Algorithm.
Internet RFC 1321. http://www.ietf.org/rfc/rfc1321 |
Rivest et al. 1978 |
Rivest, R.L., Shamir, A. and Adelman, L. (1978). A method
of obtaining digital signatures and public key cryptosystems.
Comms. ACM, Vol. 21, No. 2, pp. 120-6. |
Rodrigues et al. 1998 |
Rodrigues, L., Guerraoui, R., and Schiper, A. (1998). Scalable
Atomic Multicast. In Proceedings IEEE IC3N '98. Technical
Report 98/257. École polytechnique fédérale
de Lausanne. http://lsewww.epfl.ch |
Rose 1992 |
Rose, M. T. (1992). T he Little Black Book: Mail Bonding
with OSI Directory Services. Englewood Cliffs, NJ: Prentice-Hall. |
Rosenblum and Ousterhout 1992 |
Rosenblum, M. and Ousterhout, J. (1992). The Design and Implementation
of a Log-Structured File System, ACM Transactions on Computer
Systems, Vol. 10, No. 1, February, pp. 26-52. http://www.cs.berkeley.edu/projects/sprite/papers/lfsSOSP91.ps |
Rosenblum and Wolf 1997 |
Rosenblum, D.S. and Wolf, A.L. (1997). A Design Framework
for Internet-Scale Event Observation and Notification.
In Proceedings sixth European Software Engineering Conference/
ACM SIGSOFT Fifth Symposium on the Foundations of Software Engineering,
Zurich, Switzerland. |
Rowley 1998 |
Rowley, A. (1998). A Security Architecture for Groupware,
Doctoral Thesis, Queen Mary and Westfield College, University
of London. http://www.dcs.qmw.ac.uk/research/distrib/refs.html |
Rozier et al. 1988 |
Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien,
M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard,
P. and Neuhauser, W. (1988). Chorus Distributed Operating Systems.
Computing Systems Journal, Vol. 1, No. 4, pp. 305-70. |
Rozier et al. 1990 |
Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien,
M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard,
P. and Neuhauser, W. (1990). Overview of the Chorus Distributed
Operating System. Technical Report CS/TR-90-25.1,
Chorus Systèmes, France. |
Saltzer et al. 1984 |
Saltzer, J.H., Reed, D.P. and Clarke, D. (1984). End-to-End
Arguments in System Design, ACM Transactions on Computer
Systems Vol.2, No.4, pp. 277-88. http://web.mit.edu/Saltzer/www/publications/ |
Sandberg 1987 |
Sandberg, R. (1987). The Sun Network File System: Design,
Implementation and Experience. Technical Report.
Mountain View Calif.: Sun Microsystems. |
Sandberg et al. 1985 |
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D. and Lyon,
B. (1985). The Design and Implementation of the Sun Network File
System. In Proceedings Usenix Conference, Portland,
Ore. |
Sandhu et al. 1996 |
Sandhu, R., Coyne, E., Felstein, H. and Youman, C. (1996).
Role-Based Access Control Models, IEEE Computer, Vol.
29, No. 2, February. http://www.list.gmu.edu/journal.htm |
Sane et al. 1990 |
Sane, A., MacGregor, K. and Campbell, R. (1990). Distributed
Virtual Memory Consistency Protocols: Design and Performance.
Second IEEE Workshop on Experimental Distributed Systems,
pp. 91-6, October. |
Sansom et al. 1986 |
Sansom, R.D., Julin, D.P. and Rashid, R.F. (1986). Extending
a capability based system into a network environment. Technical
Report CMU-CS-86-116, Carnegie-Mellon University. |
Santifaller 1991 |
Santifaller. M. (1991). TCP/IP and NFS, Internetworking
in a Unix Environment. Reading, Mass: Addison-Wesley. |
Satyanarayanan 1981 |
Satyanarayanan, M. (1981). A study of file sizes and functional
lifetimes. In Proceedings 8th ACM Symposium on Operating
System Principles, Asilomar, Calif. |
Satyanarayanan 1989a |
Satyanarayanan, M. (1989). Distributed File Systems. In Distributed
Systems, an Advanced Course. (Mullender, S. ed.),
second edition, Wokingham: ACM Press/Addison-Wesley. pp 353-83. |
Satyanarayanan 1989b |
Satyanarayanan, M. (1989). Integrating Security in a Large
Distributed System. ACM Transactions on Computer Systems,
Vol. 7, No. 3, pp. 247-80. |
Satyanarayanan et al. 1990 |
Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M.E.,
Siegel, E.H. and Steere, D.C. (1990). Coda: A Highly Available
File System for a Distributed Workstation Environment. IEEE
Transactions on Computers, Vol. 39, No. 4, pp. 447-59. |
Saunders 1987 |
Saunders, B. (1987). The Information Structure of Distributed
Mutual Exclusion Algorithms. ACM Transactions on Computer
Systems, Vol. 3, No. 2, pp. 145-59. |
Scheifler and Gettys 1986 |
Scheifler, R.W. and Gettys, J. (1986). The X window system.
ACM Transactions on Computer Graphics, Vol. 5, No. 2,
pp. 76-109. |
Schiper and Raynal 1996 |
Schiper, A. and Raynal, M. (1996). From Group Communication
to Transactions in Distributed Systems. Comms. ACM,
Vol. 39, No. 4, pp. 84-7. |
Schiper and Sandoz 1993 |
Schiper, A. and Sandoz, A. (1993). Uniform reliable multicast
in a virtually synchronous environment. Proceedings 13th
International Conference on Distributed Computing Systems,
IEEE Computer Society Press, pp. 561-8. |
Schlageter 1982 |
Schlageter, G. (1982). Problems of Optimistic Concurrency
Control in Distributed Database Systems. SigMOD Record.
Vol. 13, No. 3, pp. 62-6. |
Schmidt 1998 |
Schmidt, D. (1998). Evaluating architectures for multithreaded
object request brokers, Comms. ACM, Vol. 44, No. 10,
pp. 54-60. |
Schneider 1990 |
Schneider, F.B. (1990). Implementing Fault-tolerant Services
Using the State Machine Approach: A Tutorial. ACM Computing
Surveys, Vol. 22, No. 4, pp. 300-19. |
Schneider 1996 |
Schneider, S. (1996). Security properties and CSP. In IEEE
Symposium, on Security and Privacy, pp. 174-187. |
Schneier 1996 |
Schneier, B. (1996). Applied Cryptography, second
edition. New York: John Wiley. |
Schroeder and Burrows 1990 |
Schroeder, M. and Burrows, M. (1990). The Performance of
Firefly RPC. ACM Transactions on Computer Systems, Vol.
8, No. 1. pp. 1-17. |
Schulzrinne et al. 1996 |
Schulzrinne, H., Casner, S., Frederick, D. and Jacobson,
V. (1996). RTP:A Transport Protocol for Real-Time Applications,
Internet RFC 1889, January. http://www.ietf.org/rfc/rfc1889 |
Seetharaman 1998 |
Seetharaman, K. (ed.) (1998). Special Issue: The CORBA Connection,
Comms. ACM, October, Vol. 41, No. 10. |
session directory |
User Guide to sd (Session Directory). http://irb.cs.uni-magdeburg.de/~elkner/Mbone/tools/user-sd.html |
Shannon 1949 |
Shannon, C.E. (1949). Communication Theory of Secrecy Systems,
Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715. |
Shepler 1999 |
Shepler, S. (1999). NFS Version 4 Design Considerations,
Internet RFC 2624, Sun Microsystems, June http://www.ietf.org/rfc/rfc2624 |
Shoch and Hupp 1980 |
Shoch, J.F. and Hupp, J.A. (1980). Measured performance of
an Ethernet local network. Comms. ACM, Vol. 23, No.
12, pp. 711-21. |
Shoch and Hupp 1982 |
Shoch, J.F. and Hupp, J.A. (1982). The `Worm' programs -
early experience with a distributed computation. Comms. ACM,
Vol. 25, No. 3, pp. 172-80. |
Shoch et al. 1982 |
Shoch, J.F., Dalal, Y.K. and Redell, D.D. (1982). The evolution
of the Ethernet local area network. IEEE Computer, Vol.
15, No. 8, pp. 10-28. |
Shoch et al. 1985 |
Shoch, J.F., Dalal, Y.K., Redell, D.D. and Crane, R.C. (1985).
The Ethernet. In Local Area Networks: an Advanced Course,
Lecture Notes in Computer Science. No. 184, Springer-Verlag,
pp. 1-33. |
Shrivastava et al. 1991 |
Shrivastava, S., Dixon, G.N. and Parrington, G.D. (1991).
An Overview of the Arjuna Distributed Programming System. IEEE
Software, January. pp. 66-73. |
Singh 1999 |
Singh, S. (1999). The Code Book. London: Fourth
Estate. |
Sinha and Natarajan 1985 |
Sinha, M. and Natarajan, N. (1985). A Priority Based Distributed
Deadlock Detection Algorithm. IEEE Transactions on Software
Engineering. Vol. 11, No. 1, pp. 67-80. |
Spafford 1989 |
Spafford, E.H. (1989). The Internet Worm: Crisis and Aftermath.
Comms. ACM, Vol. 32, No. 6, pp. 678-87. |
Spasojevic and Satyanarayanan 1996 |
Spasojevic, M. and Satyanarayanan, M. (1996). An Empirical
Study of a Wide-Area Distributed File System, ACM Transactions
on Computer Systems, Vol. 14, No. 2, May, pp. 200-222. |
Spector 1982 |
Spector, A.Z. (1982). Performing remote operations efficiently
on a local computer network. Comms. ACM, Vol. 25, No.
4, pp. 246-60. |
Spurgeon 2000 |
Spurgeon, C.E. (2000). Ethernet: The Definitive Guide.
O'Reilly. |
Srikanth and Toueg 1987 |
Srikanth, T. and Toueg, S. (1987). Optimal Clock Synchronization.
Journal ACM. 34, 3 (July), pp. 626-45. |
Srinivasan 1995a |
Srinivasan, R. (1995). RPC: Remote Procedure Call Protocol
Specification Version 2. Sun Microsystems. Internet
RFC 1831. August. http://www.ietf.org/rfc/rfc1831 |
Srinivasan 1995b |
Srinivasa, R. (1995). XDR: External Data Representation
Standard. Sun Microsystems. RFC 1832. Network Working
Group. August. http://www.ietf.org/rfc/rfc1832 |
Srinivasan and Mogul 1989 |
Srinivasan, V. and Mogul, J.D. (1989). Spritely NFS: Experiments
with Cache-Consistency Protocols, 12th ACM Symposium on Operating
System Principles, Litchfield Park, Az., December, pp. 45-57. |
Stallings 1998a |
Stallings, W. (1998). High Speed Networks - TCP/IP and
ATM Design Principles. Upper Saddle River, NJ: Prentice-Hall. |
Stallings 1998b |
Stallings, W. (1998). Operating Systems, third edition.
Prentice-Hall International. |
Stallings 1999 |
Stallings, W. (1999). Cryptography and Network Security
- Principles and Practice, second edition, Upper Saddle
River, NJ: Prentice-Hall. |
Steiner et al. 1988 |
Steiner, J., Neuman, C. and Schiller, J. (1988). Kerberos:
an authentication service for open network systems. In Proceedings
Usenix Winter Conference, Berkeley: Calif. |
Stelling et al. 1998 |
Stelling, P., Foster, I., Kesselman, C., Lee, C. and von
Laszewski, G. (1998). A Fault Detection Service for Wide Area
Distributed Computations, Proceedings 7th IEEE Symposium
on High Performance Distributed Computing, pp. 268-78. |
Stoll 1989 |
Stoll, C. (1989). The Cuckoo's Egg: Tracking a Spy Through
a Maze of Computer Espionage. New York: Doubleday. |
Stone 1993 |
Stone, H. (1993). High-performance Computer Architecture,
third edition. Addison-Wesley. |
Sun 1989 |
Sun Microsystems Inc. (1989). NFS: Network File System
Protocol Specification. Internet RFC 1094. http://www.ietf.org/rfc/rfc1094 |
Sun and Ellis 1998 |
Sun, C. and Ellis, C. (1998). Operational transformation
in real-time group editors: issues, algorithms, and achievements.
Proceedings Conference on Computer Supported Cooperative
Work Systems, ACM Press, pp. 59-68. |
Tanenbaum 1992 |
Tanenbaum, A.S. (1992). Modern Operating Systems.
Englewood Cliffs, NJ: Prentice-Hall. |
Tanenbaum 1996 |
Tanenbaum, A.S. (1996). Computer Networks, third
edition. Prentice-Hall International. |
Tanenbaum and van Renesse 1985 |
Tanenbaum, A. and van Renesse, R. (1985). Distributed Operating
Systems, Computing Surveys, ACM, Vol. 17, No. 4, pp.
419-70. |
Tanenbaum et al. 1990 |
Tanenbaum, A.S., van Renesse, R., van Staveren, H., Sharp,
G., Mullender, S., Jansen, J. and van Rossum, G. (1990). Experiences
with the Amoeba Distributed Operating System. Comms. ACM,
Vol. 33, No. 12, pp. 46-63. |
Terry et al. 1995 |
Terry, D., Theimer, M., Petersen, K., Demers, A, Spreitzer,
M. and Hauser, C. (1995). Managing update conflicts in Bayou,
a weakly connected replicated storage system. Proceedings
of the 15th ACM Symposium on Operating Systems Principles,
pp. 172-183. |
TFCC |
IEEE Task Force on Cluster Computing. http://www.rdt.monash.edu.au/~rajkumar/tfcc/ |
Thayer 1998 |
Thayer, R. (1998). IP Security Document Roadmap,
Internet RFC 2411, November. http://www.ietf.org/rfc/rfc2411 |
Thekkath et al. 1997 |
Thekkath, C.A., Mann, T. and Lee, E.K. (1997). Frangipani:
A Scalable Distributed File System, In Proc. 16th ACM Symposium
on Operating System Principles, St. Malo, France, October,
pp. 224-237. ftp://ftp.digital.com/pub/DEC/SRC/publications/thekkath/frangipani-sosp.ps |
Tokuda et al. 1990 |
Tokuda, H., Nakajima, T. and Rao, P. (1990). Real-time Mach:
towards a predictable real-time system. In Proceedings USENIX
Mach Workshop, pp. 73-82, October. |
Topolcic 1990 |
Topolcic, C. (ed.) (1990). Experimental Internet Stream
Protocol, Version 2. Internet RFC 1190. http://www.ietf.org/rfc/rfc1190 |
Tzou and Anderson 1991 |
Tzou, S.-Y. and Anderson, D. (1991). The performance of message-passing
using restricted virtual memory remapping. Software-Practice
and Experience, Vol. 21, pp. 251-67. |
Wahl et al. 1997 |
Wahl, M., Howes, T. and Kille, S. (1997). The Lightweight
Directory Access Protocol (v3). Internet RFC 2251.
http://www.ietf.org/rfc/rfc2251 |
Waldo 1999 |
Waldo, J. (1999). The Jini Architecture for Network-centric
Computing. Comms. ACM. Vol. 42, No. 7, pp. 76-82. |
Waldo et al. 1994 |
Waldo, J, Wyant, G., Wollrath, A. and Kendall, S. (1994).
A Note on Distributed Computing. In Arnold et al. 1999,
pp. 307-26. http://www.sun.com/research/techrep/1994/abstract-29.html |
Waldspurger et al. 1992 |
Waldspurger, C., Hogg, T., Huberman, B., Kephart, J. and
Stornetta, W. (1992). Spawn: A Distributed Computational Economy.
Transactions on Software Engineering, Vol. 18, No. 2,
pp. 103-17. |
Want et al. 1992 |
Want, R., Hopper, A., Falcao, V and Gibbons, V. (1992). The
Active Badge Location System. ACM Transactions on Information
Systems, Vol. 10, No.1, January, pp. 91-102. ftp.uk.research.att.com:/pub/docs/att/tr.92.1.pdf |
web.mit.edu I |
Kerberos: The Network Authentication Protocol. http://web.mit.edu/kerberos/www/ |
web.mit.edu II |
The Three Myths of Firewalls. http://web.mit.edu/kerberos/www/firewalls.html |
Weikum 1991 |
Weikum, G. (1991). Principles and Realization Strategies
of Multilevel Transaction Management. ACM Transactions Database
Systems, Vol. 16, No. 1, pp. 132-40. |
Weiser 1993 |
Weiser, M. (1993). Some computer science issues in ubiquitous
computing. Comms. ACM, Vol. 36, No. 7, pp. 74-84. |
Wheeler and Needham 1994 |
Wheeler, D.J. and Needham, R.M. (1994). TEA, a Tiny Encryption
Algorithm. Technical Report 355, Two Cryptographic Notes,
Computer Laboratory, University of Cambridge, December, pp. 1-3.
http://www.ftp.cl.cam.ac.uk/ftp/papers/ |
Wheeler and Needham 1997 |
Wheeler, D.J. and Needham, R.M. (1997). Tea Extensions,
October 1994, pp. 1-3. http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-xtea.ps.gz |
Wiesmann et al. 2000 |
Wiesmann, M., Pedone, F., Schiper, A., Kemme, B. and Alonso,
G. (2000). Understanding replication in databases and distributed
systems. In Proceedings 20th International Conference on
Distributed Computing Systems (ICDCS'2000), Taipei, Republic
of China, IEEE. |
Wobber et al. 1994 |
Wobber, E., Abadi, M., Burrows, M. and Lampson, B. (1994).
Authentication in the Taos operating system. ACM Transactions
Computer Systems. 12, 1 (Feb.), pp. 3-32. http://www.research.microsoft.com/lampson/Publications.html |
Wuu and Bernstein 1984 |
Wuu, G.T. and Bernstein, A.J. (1984). Efficient Solutions
to the Replicated Log and Dictionary Problems. ACM Proceedings
Third Annual Symposium Principles of Distributed Computing,
pp. 233-42. |
www.bluetooth.com |
The Official Bluetooth SIG Website. http://www.bluetooth.com/ |
www.bxa.doc.gov |
Bureau of Export Administration, US Department of Commerce,
Commercial Encryption Export Controls. http://www.bxa.doc.gov/Encryption/ |
www.cdk3.net |
Coulouris, G., Dollimore, J. and Kindberg, T. (Eds), Distributed
Systems, Concepts and Design: Supporting material. www.cdk3.net |
www.citrix.com |
Citrix Corporation. Server-based Computing White Paper.
http://www.citrix.com/products/server_based_computing/ |
www.cooltown.hp.com |
Hewlett-Packard Corporation, CoolTown nomadic computing
project pages. www.cooltown.hp.com. |
www.cren.net |
Corporation for Research and Educational Networking, CERN
Certificate Authority. http://www.cren.net/ca/ |
www.cuseeme.com |
CU-SeeMe Networks Inc, Home page. http://www.cuseeme.com/ |
www.doi.org |
International DOI Foundation, Pages on digital object
identifiers. http://www.doi.org/ |
www.handle.net |
Handle system, Home page. http://www.handle.net/ |
www.iana.org |
Internet Assigned Numbers Authority, IANA Home Page.
http://www.iana.org/ |
www.ietf.org |
Internet Engineering Task Force, Internet RFC Index Page.
http://www.ietf.org/rfc/ |
www.isoc.org |
Robert Hobbes Zakon. Hobbes' Internet Timeline.
http://www.isoc.org/internet/history/ |
www.microsoft.com |
Microsoft Corporation, NetShow Theater Server Web Page.
http://www.microsoft.com/Theater/ |
www.microsoft.com I |
Microsoft Corporation, Active Directory Services.
http://www.microsoft.com/windows2000/library/technologies/activeDirectory/ |
www.microsoft.com II |
Microsoft Corporation, Windows 2000 Kerberos Authentication,
White Paper, http://www.microsoft.com/windows2000/library/howitworks/ |
www.microsoft.com III |
Microsoft Corporation, NetMeeting home page. http://www.microsoft.com/windows/NetMeeting/ |
www.mids.org |
Matrix Information and Directory Services Inc. Internet
Performance. http://www.mids.org/topics/ |
www.millicent.com |
Compaq Corporation, Millicent MicroCommerce system.
http://www.millicent.com/ |
www.omg.org |
Object Management Group, Index to CORBA services. OMG:
Framingham, Mass. http://www.omg.org/corba/library/csindx.html |
www.opengroup.org |
Open Group, Portal to the World of DCE. http://www.opengroup.org/tech/dce/ |
www.openssl.org |
OpenSSL Project, OpenSSL: The Open Source toolkit for
SSL/TLS. http://www.openssl.org/ |
www.pgp.com |
PGP Home. http://www.pgp.com/ |
www.reed.com |
Read, D.P. (2000). The End of the End-to-End Argument.
http://www.reed.com/Papers/endofendtoend.html |
www.rsasecurity.com |
RSA Security Inc., Home page. http://www.rsasecurity.com/ |
www.rsasecurity.com I |
RSA Corporation (1997). DES Challenge. http://www.rsasecurity.com/rsalabs/challenges/ |
www.rsasecurity.com II |
RSA Corporation (1999). RSA Factoring Challenge.
http://www.rsasecurity.com/rsalabs/challenges/factoring/ |
www.rtj.org |
Real-Time for Java TM Experts Group. http://www.rtj.org/ |
www.spec.org |
SPEC SFS97 Benchmark. http://www.spec.org/osg/sfs97/ |
www.upnp.com |
Universal Plug and Play home page. http://www.upnp.com/ |
www.verisign.com |
Verisign Inc., Home page. http://www.verisign.com/ |
www.w3.org I |
World Wide Web Consortium, Home page. http://www.w3.org/ |
www.w3.org II |
World Wide Web Consortium, Pages on the HyperText Markup
Language. http://www.w3.org/MarkUp/ |
www.w3.org III |
World Wide Web Consortium, Pages on Naming and Addressing.
http://www.w3.org/Addressing/ |
www.w3.org IV |
World Wide Web Consortium, Pages on the HyperText Transfer
Protocol. http://www.w3.org/Protocols/ |
www.w3.org V |
World Wide Web Consortium, Pages on the Resource Description
Framework and other metadata schemes. www.w3.org/Metadata. |
www.w3.org VI |
World Wide Web Consortium, Pages on the Extensible Markup
Language. http://www.w3.org/XML/ |
www.w3.org VII |
World Wide Web Consortium, Pages on the Extensible Stylesheet
Language. http://www.w3.org/Style/XSL/ |
www.wapforum.org |
WAP Forum, White Papers and Specifications. http://www.wapforum.org/what/technical.htm |
www.wlana.com |
The IEEE 802.11 Wireless LAN Standard. http://www.wlana.com/intro/standard/ |
Wyckoff et al. 1998 |
Wyckoff, P., McLaughry, S., Lehman, T. and Ford, D. (1998).
T Spaces. IBM Systems Journal, Vol. 37, No. 3. |