Stabilization, Safety, and Security of Distributed Systems: 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009, held in Lyon, France, in November 2009.

The 49 revised full papers and 14 brief announcements presented together with three invited talks were carefully reviewed and selected from 126 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The special topics were alternative systems and models, autonomic computational science, cloud computing, embedded systems, fault-tolerance in distributed systems / dependability, formal methods in distributed systems, grid computing, mobility and dynamic networks, multicore computing, peer-to-peer systems, self-organizing systems, sensor networks, stabilization, and system safety and security.

Author(s): Anne-Marie Kermarrec (auth.), Rachid Guerraoui, Franck Petit (eds.)
Series: Lecture Notes in Computer Science 5873 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 801
Tags: Computer Communication Networks; Special Purpose and Application-Based Systems; Computation by Abstract Devices; Algorithm Analysis and Problem Complexity; Systems and Data Security; Management of Computing and Information Systems

Front Matter....Pages -
Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE....Pages 1-16
Local Algorithms: Self-stabilization on Speed....Pages 17-34
As Good as It Gets: Competitive Fault Tolerance in Network Structures....Pages 35-46
Multicore Constraint-Based Automated Stabilization....Pages 47-61
A Theory of Network Tracing....Pages 62-74
Developing Autonomic and Secure Virtual Organisations with Chemical Programming....Pages 75-89
Making Population Protocols Self-stabilizing....Pages 90-104
Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios....Pages 105-119
Consensus When All Processes May Be Byzantine for Some Time....Pages 120-132
A Superstabilizing log( n )-Approximation Algorithm for Dynamic Steiner Trees....Pages 133-148
Looking for the Weakest Failure Detector for k -Set Agreement in Message-Passing Systems: Is ${\it \Pi}_k$ the End of the Road?....Pages 149-164
Optimal Byzantine Resilient Convergence in Asynchronous Robots Networks....Pages 165-179
FoG : Fighting the Achilles’ Heel of Gossip Protocols with Fountain Codes....Pages 180-194
How to Improve Snap-Stabilizing Point-to-Point Communication Space Complexity?....Pages 195-208
Fault-Containment in Weakly-Stabilizing Systems....Pages 209-223
Stability of Distributed Algorithms in the Face of Incessant Faults....Pages 224-237
Dependability Engineering of Silent Self-stabilizing Systems....Pages 238-253
Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective....Pages 254-268
Efficient Robust Storage Using Secret Tokens....Pages 269-283
An Optimal Self-stabilizing Firing Squad....Pages 284-296
Anonymous Transactions in Computer Networks....Pages 297-310
Nash Equilibria in Stabilizing Systems....Pages 311-324
ACCADA: A Framework for Continuous Context-Aware Deployment and Adaptation....Pages 325-340
A Self-stabilizing Approximation Algorithm for Vertex Cover in Anonymous Networks....Pages 341-353
Separation of Circulating Tokens....Pages 354-368
Visiting Gafni’s Reduction Land: From the BG Simulation to the Extended BG Simulation....Pages 369-383
Randomized Gathering of Mobile Robots with Local-Multiplicity Detection....Pages 384-398
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat....Pages 399-412
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks....Pages 413-427
Cached Sensornet Transformation of Non-silent Self-stabilizing Algorithms with Unreliable Links....Pages 428-442
Analysis of an Intentional Fault Which Is Undetectable by Local Checks under an Unfair Scheduler....Pages 443-457
Exploring Polygonal Environments by Simple Robots with Faulty Combinatorial Vision....Pages 458-471
Finding Good Partners in Availability-Aware P2P Networks....Pages 472-484
Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables....Pages 485-499
Distributed Power Control with Multiple Agents in a Distributed Base Station Scheme Using Macrodiversity....Pages 500-514
Redundancy Maintenance and Garbage Collection Strategies in Peer-to-Peer Storage Systems....Pages 515-530
Model Checking Coalition Nash Equilibria in MAD Distributed Systems....Pages 531-546
OpenMP Support for NBTI-Induced Aging Tolerance in MPSoCs....Pages 547-562
A Self-stabilizing Algorithm for Graph Searching in Trees....Pages 563-577
A Metastability-Free Multi-synchronous Communication Scheme for SoCs....Pages 578-592
From Local Impact Functions to Global Adaptation of Service Compositions....Pages 593-608
A Wireless Security Framework without Shared Secrets....Pages 609-623
Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks....Pages 624-639
Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning....Pages 640-654
Network-Friendly Gossiping....Pages 655-669
Black Hole Search with Tokens in Interconnected Networks....Pages 670-682
Oracle-Based Flocking of Mobile Robots in Crash-Recovery Model....Pages 683-697
Speculation for Parallelizing Runtime Checks....Pages 698-710
Optimistic Fair Exchange Using Trusted Devices....Pages 711-725
Application Data Consistency Checking for Anomaly Based Intrusion Detection....Pages 726-740
Self Adaptive High Interaction Honeypots Driven by Game Theory....Pages 741-755
Cooperative Autonomic Management in Dynamic Distributed Systems....Pages 756-770
Brief Announcement: Consistent Fixed Points and Negative Gain....Pages 771-772
Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems....Pages 773-774
Safer Than Safe: On the Initial State of Self-stabilizing Systems....Pages 775-776
Brief Announcement: Unique Permutation Hashing....Pages 777-778
Randomization Adaptive Self-stabilization....Pages 779-780
Brief Announcement: On the Time Complexity of Distributed Topological Self-stabilization....Pages 781-782
Brief Announcement: An OS Architecture for Device Self-protection....Pages 783-784
Brief Announcement: Towards Secure Cloud Computing....Pages 785-786
Brief Announcement: Robust Self-stabilizing Construction of Bounded Size Weight-Based Clusters....Pages 787-788
Brief Announcement: A Stabilizing Algorithm for Finding Two Disjoint Paths in Arbitrary Networks....Pages 789-790
Relocation Analysis of Stabilizing MAC....Pages 791-792
Brief Announcement: A Simple and Quiescent Omega Algorithm in the Crash-Recovery Model....Pages 793-794
Brief Announcement: How to Overcome the Limits of Bounds....Pages 795-796
Brief Announcement: The Design and Evaluation of a Distributed Reliable File System....Pages 797-798
Back Matter....Pages -