Now showing items 461-468 of 468

    • Pesto flavoured security 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2002-05)
      Pesto aims at providing highly available and secure storage for longlived data to mobile users roaming into untrusted environments. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. A mechanism supporting one aspect may adversely affect another. For example, replication may increase availability but complicates supporting confidentiality, and simply ...
    • An approach towards an agent computing environment 

      Marzullo, Keith; Johansen, Dag; Lauvset, Kåre J. (Research report; Forskningsrapport, 1998)
      We devise a mobile agent middleware architecture for supporting distributed applications in a wide-area network. The architecture provides a structural framework for functional components that are needed to support mobile agents in asymmetric networking environments.
    • The taste of Pesto 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2001-08)
      The Pesto distributed storage platform is geared towards a computing model where private machines play a pivotal r ˆ ole. We argue that no centralized solutions are acceptable in its design and that it supports allocation of separate tasks to separate system components found in its target environment. Hence, Pesto separates trust from responsibility, storage from access control policy, and ...
    • The Pesto project. Goals and motivation 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2001-06)
      Pesto is a storage system geared towards a computing model where private machines play a pivotal role. Sharing of data is crucial, both between partners, and between the many devices owned by individual users. Replication is the only sensible means to provide ubiquitous access to private data. However, without provisions, replication endangers privacy by enlarging the Trusted Computing Base. The ...
    • Authorization and access control in a distributed file repository 

      Arild, Ronny; Stabell-Kulø, Tage (Research report; Forskningsrapport, 1999-01-18)
      A distributed file repository is described. It supports interaction between different machines used by a single user, as well as between users that share data. Files can be replicated and consistency will be maintained, or files can be shipped (copied) to a remote site. As with more traditional systems, the servers are trusted not to leak information. However, the rôle servers play is not as much ...
    • Some hints on the theory and practice of authentication in distributed systems 

      Stabell-Kulø, Tage; Bottoni, Andrea (Research report; Forskningsrapport, 2003-05-17)
      Authentication in Distributed Systems: Theory and Practice provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of tricky points.
    • TOS: A Kernel of a Distributed Systems Management System 

      Marzullo, Keith; Lauvset, Kåre J.; Johansen, Dag (Research report; Forskningsrapport, 2000-03-02)
      Distributed systems are becoming harder to manage, in part because the uses we put to distributed systems are rapidly changing. Hence, the software used to manage a distributed system needs to be flexible enough to accommodate these new uses. It also has to be secure enough to not allow unauthorized changes to be made to the system. We present a library and a kernel that supports the management ...
    • Adding mobility to non-mobile web robots 

      Sudmann, Nils P.; Johansen, Dag (Research report; Forskningsrapport, 2000)
      In this paper we will show that it is possible to combine mobile agent technology with existing non-mobile data mining applications. The motivation for this is the advantage mobile agents offer in moving the computation closer to the data in a distributed system. This can save bandwidth and increase performance when the data is condensed as a result of data mining.