首页 > 最新文献

EW 11最新文献

英文 中文
Impeding attrition attacks in P2P systems 阻止P2P系统的损耗攻击
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133601
Petros Maniatis, T. J. Giuli, M. Roussopoulos, D. Rosenthal, Mary Baker
P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-level abuse of the peer communication protocol. We identify a set of defenses that systems can deploy against such attacks and potential synergies among them. We illustrate the application of these defenses in the context of the LOCKSS digital preservation system.
P2P系统暴露在异常广泛的攻击之下。这些攻击包括一系列拒绝服务攻击或损耗攻击,从低级数据包泛滥到高级滥用对等通信协议。我们确定了系统可以部署的一组防御措施,以防止此类攻击以及它们之间的潜在协同作用。我们在LOCKSS数字保存系统的背景下说明这些防御的应用。
{"title":"Impeding attrition attacks in P2P systems","authors":"Petros Maniatis, T. J. Giuli, M. Roussopoulos, D. Rosenthal, Mary Baker","doi":"10.1145/1133572.1133601","DOIUrl":"https://doi.org/10.1145/1133572.1133601","url":null,"abstract":"P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-level abuse of the peer communication protocol. We identify a set of defenses that systems can deploy against such attacks and potential synergies among them. We illustrate the application of these defenses in the context of the LOCKSS digital preservation system.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Virtual private machines: user-centric performance 虚拟专用机:以用户为中心的性能
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133595
D. B. Stewart, R. Mortier
Inconsistent system behavior causes unpredictable performance which is known to stress users; making the system perform consistently should remove this source of user stress. Operating systems currently provide the illusion that each application runs on a dedicated Virtual Machine. This paper proposes incorporating performance into this abstraction, resulting in a Virtual Private Machine. The VPM abstraction aims to improve user-perceived performance by increasing performance consistency, and it is applicable to any user-visible application, from word processors to web servers. To provide VPMs, per-resource performance models allow resources to be scheduled to meet target response times calculated for each user-visible action.
不一致的系统行为导致不可预测的性能,这是已知的压力用户;使系统始终如一地运行应该可以消除这种用户压力来源。当前的操作系统提供了一种错觉,即每个应用程序都运行在专用的虚拟机上。本文建议将性能纳入这种抽象,从而产生虚拟专用机。VPM抽象旨在通过提高性能一致性来提高用户感知的性能,它适用于任何用户可见的应用程序,从文字处理器到web服务器。为了提供vpm,每资源性能模型允许对资源进行调度,以满足为每个用户可见操作计算的目标响应时间。
{"title":"Virtual private machines: user-centric performance","authors":"D. B. Stewart, R. Mortier","doi":"10.1145/1133572.1133595","DOIUrl":"https://doi.org/10.1145/1133572.1133595","url":null,"abstract":"Inconsistent system behavior causes unpredictable performance which is known to stress users; making the system perform consistently should remove this source of user stress. Operating systems currently provide the illusion that each application runs on a dedicated Virtual Machine. This paper proposes incorporating performance into this abstraction, resulting in a Virtual Private Machine. The VPM abstraction aims to improve user-perceived performance by increasing performance consistency, and it is applicable to any user-visible application, from word processors to web servers. To provide VPMs, per-resource performance models allow resources to be scheduled to meet target response times calculated for each user-visible action.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126633846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generic role assignment for wireless sensor networks 无线传感器网络的通用角色分配
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133588
K. Römer, C. Frank, P. Marrón, C. Becker
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network application requires some form of self-configuration, where sensor nodes take on specific functions or roles in the network without manual intervention. These roles may be based on varying sensor node properties (e.g., available sensors, location, network neighbors) and may be used to support applications requiring heterogeneous node functionality (e.g., clustering, data aggregation). In this paper we argue that the assignment of user-defined roles is a fundamental part of a wide range of sensor network applications. Consequently, a framework for assignment of roles to sensor nodes in an application-specific manner could significantly ease sensor network programming. We outline the general structure of such a framework and present a first approach to its realization. We demonstrate its utility and feasibility using a number of concrete examples.
传感器节点的无线自组织网络被设想部署在物理环境中,以监测各种各样的现实世界现象。几乎任何传感器网络应用都需要某种形式的自配置,其中传感器节点在网络中承担特定的功能或角色,而无需人工干预。这些角色可以基于不同的传感器节点属性(例如,可用的传感器、位置、网络邻居),并且可以用于支持需要异构节点功能的应用程序(例如,集群、数据聚合)。在本文中,我们认为用户定义角色的分配是广泛的传感器网络应用的基本部分。因此,以特定于应用程序的方式为传感器节点分配角色的框架可以显著简化传感器网络编程。我们概述了这种框架的总体结构,并提出了实现它的第一种方法。我们用一些具体的例子来证明它的实用性和可行性。
{"title":"Generic role assignment for wireless sensor networks","authors":"K. Römer, C. Frank, P. Marrón, C. Becker","doi":"10.1145/1133572.1133588","DOIUrl":"https://doi.org/10.1145/1133572.1133588","url":null,"abstract":"Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network application requires some form of self-configuration, where sensor nodes take on specific functions or roles in the network without manual intervention. These roles may be based on varying sensor node properties (e.g., available sensors, location, network neighbors) and may be used to support applications requiring heterogeneous node functionality (e.g., clustering, data aggregation). In this paper we argue that the assignment of user-defined roles is a fundamental part of a wide range of sensor network applications. Consequently, a framework for assignment of roles to sensor nodes in an application-specific manner could significantly ease sensor network programming. We outline the general structure of such a framework and present a first approach to its realization. We demonstrate its utility and feasibility using a number of concrete examples.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125321065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Eluding carnivores: file sharing with strong anonymity 躲避食肉动物:具有强匿名性的文件共享
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133611
E. G. Sirer, Sharad Goel, Mark E Robson, Dogan Engin
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficient file sharing system that provides strong anonymity. HerbivoreFS provides computational guarantees that even adversaries able to monitor all network traffic cannot deduce the identity of a sender or receiver beyond an anonymizing clique of k peers. HerbivoreFS achieves scalability by partitioning the global network into smaller anonymizing cliques. Measurements on PlanetLab indicate that the system achieves high anonymous bandwidth when deployed on the Internet.
由于对审查和隐私的担忧,匿名性对网络应用程序越来越重要。本文概述了HerbivoreFS的设计,这是一个可扩展的、高效的、提供强匿名性的文件共享系统。HerbivoreFS提供了计算保证,即使是能够监控所有网络流量的攻击者也无法推断出发送者或接收者的身份,除非是k个匿名的对等体。HerbivoreFS通过将全球网络划分为更小的匿名集团来实现可扩展性。在PlanetLab上的测量表明,该系统在互联网上部署时实现了高匿名带宽。
{"title":"Eluding carnivores: file sharing with strong anonymity","authors":"E. G. Sirer, Sharad Goel, Mark E Robson, Dogan Engin","doi":"10.1145/1133572.1133611","DOIUrl":"https://doi.org/10.1145/1133572.1133611","url":null,"abstract":"Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficient file sharing system that provides strong anonymity. HerbivoreFS provides computational guarantees that even adversaries able to monitor all network traffic cannot deduce the identity of a sender or receiver beyond an anonymizing clique of k peers. HerbivoreFS achieves scalability by partitioning the global network into smaller anonymizing cliques. Measurements on PlanetLab indicate that the system achieves high anonymous bandwidth when deployed on the Internet.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Data lifetime is a systems problem 数据生存期是一个系统问题
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133599
Tal Garfinkel, Ben Pfaff, Jim Chow, M. Rosenblum
As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked in the design of most of today's operating systems, libraries, languages, etc. As a result, applications are likely to leave the sensitive data they handle (passwords, financial and military information, etc.) scattered widely over memory, leaked to disk, etc. and left there for an indeterminate period of time. This greatly increases the impact of a system compromise.Dealing with data lifetime issues is currently left to application developers, who largely overlook them. Security-aware developers who attempt to address them (e.g. cryptographic library writers) are stymied by the limitations of the operating systems, languages, etc. they rely on. We argue that data lifetime is a systems issue which must be recognized and addressed at all layers of the software stack.
随着敏感数据生命周期(即在内存中的传播和持续时间)的增加,暴露的风险也在增加。不幸的是,在当今大多数操作系统、库、语言等的设计中,这个问题在很大程度上被忽视了。因此,应用程序很可能将它们处理的敏感数据(密码、财务和军事信息等)分散在内存中,泄漏到磁盘等,并在不确定的时间内留在那里。这大大增加了系统泄漏的影响。处理数据生命周期问题目前留给了应用程序开发人员,他们在很大程度上忽略了这些问题。试图解决这些问题的安全意识开发人员(例如加密库编写者)受到他们所依赖的操作系统、语言等的限制。我们认为,数据生命周期是一个系统问题,必须在软件堆栈的所有层认识和解决。
{"title":"Data lifetime is a systems problem","authors":"Tal Garfinkel, Ben Pfaff, Jim Chow, M. Rosenblum","doi":"10.1145/1133572.1133599","DOIUrl":"https://doi.org/10.1145/1133572.1133599","url":null,"abstract":"As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked in the design of most of today's operating systems, libraries, languages, etc. As a result, applications are likely to leave the sensitive data they handle (passwords, financial and military information, etc.) scattered widely over memory, leaked to disk, etc. and left there for an indeterminate period of time. This greatly increases the impact of a system compromise.Dealing with data lifetime issues is currently left to application developers, who largely overlook them. Security-aware developers who attempt to address them (e.g. cryptographic library writers) are stymied by the limitations of the operating systems, languages, etc. they rely on. We argue that data lifetime is a systems issue which must be recognized and addressed at all layers of the software stack.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Long-term time-share guarantees are necessary for wireless LANs 长期分时保障是无线局域网的必要条件
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133583
Godfrey Tan, J. Guttag
Wireless local area networks (WLANs) based on a family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at a lower data rate (by using a more resilient modulation scheme) increases the frame transmission time but reduces the bit error rate. In non-cooperative environments such as public hot-spots, individual nodes attempt to maximize their achieved throughput by adjusting the data rate or frame size used, irrespective of the impact of this on overall system performance.In a series of experiments, we demonstrate that the existing distributed MAC protocol encourages non-cooperative nodes to use globally inefficient transmission strategies that lead to degraded aggregate throughputs. We also show that by establishing independence between the allocation of the shared channel time and the strategies used by individual nodes, an improved MAC protocol can lead rational but non-cooperative nodes to make choices that increase aggregate throughputs by as much as 30% under some conditions.
基于一系列802.11技术的无线局域网(wlan)正变得无处不在。这些技术支持多种数据传输速率。以较低的数据速率传输(通过使用更有弹性的调制方案)增加了帧传输时间,但降低了误码率。在非合作环境(如公共热点)中,单个节点试图通过调整所使用的数据速率或帧大小来最大化其实现的吞吐量,而不考虑这对整体系统性能的影响。在一系列实验中,我们证明了现有的分布式MAC协议鼓励非合作节点使用全局低效的传输策略,从而导致聚合吞吐量下降。我们还表明,通过在共享信道时间的分配和单个节点使用的策略之间建立独立性,改进的MAC协议可以引导理性但不合作的节点做出选择,在某些条件下将总吞吐量提高多达30%。
{"title":"Long-term time-share guarantees are necessary for wireless LANs","authors":"Godfrey Tan, J. Guttag","doi":"10.1145/1133572.1133583","DOIUrl":"https://doi.org/10.1145/1133572.1133583","url":null,"abstract":"Wireless local area networks (WLANs) based on a family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at a lower data rate (by using a more resilient modulation scheme) increases the frame transmission time but reduces the bit error rate. In non-cooperative environments such as public hot-spots, individual nodes attempt to maximize their achieved throughput by adjusting the data rate or frame size used, irrespective of the impact of this on overall system performance.In a series of experiments, we demonstrate that the existing distributed MAC protocol encourages non-cooperative nodes to use globally inefficient transmission strategies that lead to degraded aggregate throughputs. We also show that by establishing independence between the allocation of the shared channel time and the strategies used by individual nodes, an improved MAC protocol can lead rational but non-cooperative nodes to make choices that increase aggregate throughputs by as much as 30% under some conditions.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors 通过使用不可信组件减少TCB大小:小内核与虚拟机监视器
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133615
Michael Hohmuth, M. Peter, Hermann Härtig, J. Shapiro
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness.In this paper, we oppose the view that virtual-machine monitors (VMMs) are the smallest systems that provide secure isolation because they have been specifically designed to provide little more than this property. The problem with this assertion is that VMMs typically do not support interprocess communication, complicating the use of untrusted components inside a secure systems.We propose extending traditional VMMs with features for secure message passing and memory sharing to enable the use of untrusted components in secure systems. We argue that moving system components out of the TCB into the untrusted part of the system and communicating with them using IPC reduces the overall size of the TCB.We argue that many secure applications can make use of untrusted components through trusted wrappers without risking security properties such as confidentiality and integrity.
安全系统最好构建在小型可信操作系统之上:操作系统越小,就越容易保证或验证其正确性。在本文中,我们反对虚拟机监视器(vmm)是提供安全隔离的最小系统的观点,因为它们被专门设计为提供这个属性。这种断言的问题在于vmm通常不支持进程间通信,这使得在安全系统中使用不受信任的组件变得复杂。我们建议扩展传统的vmm,使其具有安全消息传递和内存共享的特性,以便在安全系统中使用不受信任的组件。我们认为,将系统组件从TCB移到系统中不受信任的部分,并使用IPC与它们通信,可以减少TCB的总体大小。我们认为,许多安全应用程序可以通过受信任的包装器使用不受信任的组件,而不会危及机密性和完整性等安全属性。
{"title":"Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors","authors":"Michael Hohmuth, M. Peter, Hermann Härtig, J. Shapiro","doi":"10.1145/1133572.1133615","DOIUrl":"https://doi.org/10.1145/1133572.1133615","url":null,"abstract":"Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness.In this paper, we oppose the view that virtual-machine monitors (VMMs) are the smallest systems that provide secure isolation because they have been specifically designed to provide little more than this property. The problem with this assertion is that VMMs typically do not support interprocess communication, complicating the use of untrusted components inside a secure systems.We propose extending traditional VMMs with features for secure message passing and memory sharing to enable the use of untrusted components in secure systems. We argue that moving system components out of the TCB into the untrusted part of the system and communicating with them using IPC reduces the overall size of the TCB.We argue that many secure applications can make use of untrusted components through trusted wrappers without risking security properties such as confidentiality and integrity.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129684906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
Undo for anyone, anywhere, anytime 撤销任何人,任何地点,任何时间
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133579
James O'Brien, M. Shapiro
Computer systems are complex and unforgiving. Users need environments more tolerant of errors, allowing them to correct mistakes and explore alternatives. This is the aim of Joyce. Joyce records application usage across the system in such a way that the semantic relationships between individual operations are preserved. Using this information Joyce enables an exploratory model of undo/redo; the user can navigate, visualize, edit and experiment with the history of the system safe in the knowledge that any history change will not have unforeseen and irreversible effects.
计算机系统是复杂而无情的。用户需要对错误更宽容的环境,允许他们纠正错误并探索替代方案。这就是乔伊斯的目的。Joyce以保留各个操作之间的语义关系的方式记录整个系统的应用程序使用情况。利用这些信息,Joyce实现了一个探索性的撤销/重做模型;用户可以导航、可视化、编辑和实验系统的历史安全的知识,任何历史的变化将不会有不可预见的和不可逆转的影响。
{"title":"Undo for anyone, anywhere, anytime","authors":"James O'Brien, M. Shapiro","doi":"10.1145/1133572.1133579","DOIUrl":"https://doi.org/10.1145/1133572.1133579","url":null,"abstract":"Computer systems are complex and unforgiving. Users need environments more tolerant of errors, allowing them to correct mistakes and explore alternatives. This is the aim of Joyce. Joyce records application usage across the system in such a way that the semantic relationships between individual operations are preserved. Using this information Joyce enables an exploratory model of undo/redo; the user can navigate, visualize, edit and experiment with the history of the system safe in the knowledge that any history change will not have unforeseen and irreversible effects.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129247216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Transactional file systems can be fast 事务性文件系统可以很快
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133592
B. Liskov, R. Rodrigues
Transactions ensure simple and correct handling of concurrency and failures but are often considered too expensive for use in file systems. This paper argues that performance is not a barrier to running transactions. It presents a simple mechanism that substantially lowers the cost of read-only transactions (which constitute the bulk of operations in a file system). The approach is inexpensive: it requires modest additional storage, but storage is cheap. It causes read-only transactions to run slightly in the past, but guarantees that they nevertheless see a consistent state.
事务确保简单而正确地处理并发性和故障,但通常被认为在文件系统中使用过于昂贵。本文认为,性能不是运行事务的障碍。它提供了一种简单的机制,大大降低了只读事务(它构成了文件系统中的大部分操作)的成本。这种方法并不昂贵:它只需要少量的额外存储空间,但存储空间很便宜。它导致只读事务在过去稍微运行,但保证它们仍然看到一致的状态。
{"title":"Transactional file systems can be fast","authors":"B. Liskov, R. Rodrigues","doi":"10.1145/1133572.1133592","DOIUrl":"https://doi.org/10.1145/1133572.1133592","url":null,"abstract":"Transactions ensure simple and correct handling of concurrency and failures but are often considered too expensive for use in file systems. This paper argues that performance is not a barrier to running transactions. It presents a simple mechanism that substantially lowers the cost of read-only transactions (which constitute the bulk of operations in a file system). The approach is inexpensive: it requires modest additional storage, but storage is cheap. It causes read-only transactions to run slightly in the past, but guarantees that they nevertheless see a consistent state.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116179101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Request extraction in Magpie: events, schemas and temporal joins Magpie中的请求提取:事件、模式和时态连接
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133608
R. Isaacs, P. Barham, James R. Bulpin, R. Mortier, D. Narayanan
This paper addresses the problem of extracting individual request activity from interleaved event traces. We present a new technique for event correlation which applies a form of temporal join over timestamped, parameterized event streams in order to identify the events pertaining to an individual request. Event schemas ensure that the request extraction mechanism applies to any server application or service without modification, and is robust against future changes in application behavior. This work is part of the Magpie project [2], which is developing infrastructure to track requests end-to-end in a distributed system.
本文解决了从交错的事件轨迹中提取单个请求活动的问题。我们提出了一种新的事件关联技术,该技术在带有时间戳的参数化事件流上应用一种时间连接形式,以识别与单个请求相关的事件。事件模式确保请求提取机制无需修改即可应用于任何服务器应用程序或服务,并且对应用程序行为的未来更改具有健壮性。这项工作是Magpie项目[2]的一部分,该项目正在开发用于在分布式系统中跟踪端到端请求的基础设施。
{"title":"Request extraction in Magpie: events, schemas and temporal joins","authors":"R. Isaacs, P. Barham, James R. Bulpin, R. Mortier, D. Narayanan","doi":"10.1145/1133572.1133608","DOIUrl":"https://doi.org/10.1145/1133572.1133608","url":null,"abstract":"This paper addresses the problem of extracting individual request activity from interleaved event traces. We present a new technique for event correlation which applies a form of temporal join over timestamped, parameterized event streams in order to identify the events pertaining to an individual request. Event schemas ensure that the request extraction mechanism applies to any server application or service without modification, and is robust against future changes in application behavior. This work is part of the Magpie project [2], which is developing infrastructure to track requests end-to-end in a distributed system.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122381314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
EW 11
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1