Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Measurements of a distributed file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Disconnected operation in the Coda File System
ACM Transactions on Computer Systems (TOCS)
Advances in public-key certificate standards
ACM SIGSAC Review - Special issue: Issues 94 workshop on public key cryptography
Exploiting weak connectivity for mobile file access
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Flexible update propagation for weakly consistent replication
Proceedings of the sixteenth ACM symposium on Operating systems principles
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Session guarantees for weakly consistent replicated data
PDIS '94 Proceedings of the third international conference on on Parallel and distributed information systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model
IEEE Network: The Magazine of Global Internetworking
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Fast Reconciliations in Fluid Replication
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Safety, Visibility, and Performance in a Wide-Area File System
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Safety, visibility, and performance in a wide-area file system
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Hi-index | 0.00 |
Mobile nodes rely on external services to provide safety, sharing, and additional resources. Unfortunately, as mobile nodes move through the networking infrastructure, the costs of accessing servers change. Fluid replication allows mobile clients to create replicas where and when they are needed. Unfortunately, one must trust the nodes holding these replicas, and establishing trust in autonomously administered nodes is a difficult task. Instead, we argue that trust should be deferred. In this position paper, we present the design of Stonewall, a system that defers trust decisions through the use of two mechanisms: packages and receipts. The former ensure confidentiality and detect breaches of integrity; the latter detect breaches of non-repudiation.