FuDiCo II: S.O.S. Survivability: Obstacles and Solutions 2nd Bertinoro Workshop on Future Directions in Distributed Computing
23-25 June 2004 |
---|
Keynote Lecture
|
---|
Fred Schneider Cornell University (USA) |
Discussion |
Technical Session 1: Survivability and Privacy
|
---|
The Edge of
Privacy V. Shmatikov SRI (USA) |
Survivability: Beyond Fault-Tolerance
and Security L. Zhou Microsoft Research (USA) |
Modern Security
with Traditional Distributed Algorithms R. Guerraoui and M. Vukolic EPFL (Switzerland) |
Discussion |
Technical Session 2:
Measuring Robustness
|
---|
Statistical Monitoring + Predictable
Recovery = Self-*
A Fox, E. Kiciman, D.A Patterson, R. Katz, M. Jordan, I. Stoica, and D. Tygar. Stanford University and UC Berkeley (USA) |
Towards a
framework for automated robustness evaluation of distributed
services D. Oppenheimer, V. Vatkovskiy, and D.A. Patterson UC Berkeley (USA) |
Discussion |
Technical Session 3:
Peer-to-peer Systems
|
---|
On designing
incentives-compatible peer-to-peer systems T.W. Ngan, A. Nandi, A. Singh, D.S. Wallach, P. Druschel Rice University (USA) |
Limiting Duplicate
Identities in Distributed Systems E. Jaffe, D. Malkhi, E. Pavlov The Hebrew University of Jerusalem (Israel) |
Discussion |
Technical Session 4: Survivable Storage
|
---|
A protocol family
approach to survivable storage infrastructures J. Wylie, G.R. Goodson, G.R. Ganger, and M.K. Reiter CMU (USA) |
Optimal
Resilience Wait-Free Storage from Byzantine Components: Inherent
Costs and Solutions G. Chokler, I. Keidar, and D. Malkhi MIT (USA), Technion (Israel) and The Hebrew University of Jerusalem (Israel) |
Byzantine Fault
Tolerance in Long-Lived Systems R. Rodrigues and B. Liskov MIT (USA) |
Discussion |
Keynote Lecture
|
---|
Carl Landwehr National Science Foundation (USA) |
Discussion |
Technical Session 5: Gossip-based Protocols
|
---|
Towards
Survivability of Application-Level Multicast G. Badishi, I. Keidar, and R. Melamed Technion (Israel) |
Detection and Removal of Malicious Peers in Gossip-Based
Protocols M. Jelasity, A. Montresor, and O. Babaoglu Università di Bologna (Italy) |
Self-Adapting Epidemic Broadcast Algorithms L. Rodrigues and J. Pereira Universidade de Lisboa (Portugal) |
Discussion |
Technical Session 6-I: Byzantine Protocols
|
---|
Wormhole-Aware
Byzantine Protocols N. Ferreira Neves, M. Correia and Paulo Verissimo Universidade de Lisboa (Portugal) |
Coping with the
Insider Threat in Scalable Distributed Information Systems
C. Nita-Rotaru and Y. Amir Purdue University and Johns Hopkins University (USA) |
Discussion |
Technical Session 6-II: Byzantine Protocols
|
---|
Distributing Trust on the
Internet C. Cachin IBM Research Zurich (Switzerland) |
Byzantine Replication for
Trustworthy Systems J.P. Martin and L. Alvisi UT Austin (USA) |
Discussion |
Technical Session 7: Survivable Software
|
---|
Customizable and Adaptive
Survivability M. Hiltunen and R. Schlichting AT&T Research (USA) |
Robust multi-threading J. Napper and L. Alvisi UT Austin (USA) |
Survivability of
Operating Systems: Handling Vulnerabilities N. Suri and A. Johansson TU Darmstadt (Germany) |
Discussion |
Keynote Lecture
|
---|
Jacques Stern Ecole Normale Supérieure (France) |
Discussion |
Technical Session 8: Solitaires
|
---|
Fault-Tolerant
Forwarding in the Face of Malicious Routers A.T. Mizrack, K. Marzullo, and S. Savage UC San Diego (USA) |
Integrating End-to-end
Security and Fault Tolerance A. Myers Cornell University (USA) |
Securely Improving
Performance Through Speculative Predicitve Remote Execution
B. Yee Google (USA) |
Discussion |