Experiences with the Amoeba distributed operating system
Communications of the ACM
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Disconnected operation in the Coda File System
ACM Transactions on Computer Systems (TOCS)
Mobile Computing with the Rover Toolkit
IEEE Transactions on Computers - Special issue on mobile computing
Agile application-aware adaptation for mobility
Proceedings of the sixteenth ACM symposium on Operating systems principles
System support for transparency and network-aware adaptation in mobile environments
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Programming semantics for multiprogrammed computations
Communications of the ACM
Disconnected Operation in a Distributed File System
Disconnected Operation in a Distributed File System
Distributed Operating Systems: The Logical Design
Distributed Operating Systems: The Logical Design
Weighted voting for replicated data
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Commentaries on “Active networking and end-to-end arguments”
IEEE Network: The Magazine of Global Internetworking
Information Sharing with Handheld Appliances
EHCI '01 Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction
Using Handheld Devices in Synchronous Collaborative Scenarios
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
Public-key cryptography and availability
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |
A truly personal machine, called a private machine and implemented as a Personal Digital Assistant (PDA), is fundamentally different from traditional machines. It is personal and private in an unprecedented manner, and its modus operandi is such that network and power failures will not be rare. Designing distributed systems where PDAs are treated as "first class citizens" is a challenge. Furthermore, private assets (electronic money, keys for authentication and opening doors) will be stored in PDAs. Ownership and control of these assets and the media that store and communicate them should remain with the user. This must be reflected in the design of systems for private computing. We introduce the "open-ended argument" to describe the design strategy we used for designing a system that is designed to reveal information to the user (as opposed to hide it). We argue and show that when systems are designed this way, the user (a human) is better able to control the system and his personal data, as he can make better decisions than the system itself based on qualitative assessment of the provided information. The system we have designed and implemented under this design guidelines is presented and discussed.