Spinglass: Secure and Scalable Communication Tools for Mission-Critical Computing

نویسندگان

  • Kenneth P. Birman
  • Robbert van Renesse
  • Werner Vogels
چکیده

Most existing communications technologies are either not scalable at all, or scale only under carefully controlled conditions. This threatens an emerging generation of mission-critical but very large computing systems, which will need communication support for such purposes as system management and control, policy administration, data dissemination, and to initiate adaptation in demanding environments. Cornell University’s Spinglass project has discovered that “gossip-based” protocols can overcome scalability problems, offering security and reliability even in the most demanding settings. Gossip protocols emulate the spread of an infection in a crowded population, and are both reliable and stable under forms of stress that can disable more traditional protocols. Our effort is developing a new generation of gossip-based technology for secure, reliable large-scale collaboration and soft real-time communications – even over global networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Epidemic Techniques for Building Ultra - Scalable Reliable

Building very large computing systems is extremely challenging, given the lack of scalable communication technologies. This threatens a new generation of mission-critical but very large computing systems. Fortunately, a new generation of “gossip-based” or epidemic protocols can overcome scalability problems, offering security and reliability even in the most demanding settings. Epidemic protoco...

متن کامل

Public Key Cryptography by Centralized offline Server in Mission-Critical Networks

–Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unreli...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Secure Middleware for Situation-Aware Naval C2 and Combat Systems

There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of attacks and changing mission needs. For the Navy's vision of Network Centric Warfare and the Total Ship Computing Environment to succeed, there is an urgent need for a secure, robust, and survivable network infrastructure...

متن کامل

Secure Middleware for Situation Aware Naval C and Combat Systems

There is an increasing need within the Navy Ma rine Corps for building distributed situation aware ap plications that are rapidly recon gurable and surviv able in the face of attacks and changing mission needs For the Navy s vision of Network Centric Warfare and Total Ship Computing to succeed there is an urgent need for a secure robust and survivable network in frastructure for disseminating m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001