2009
Authors
Barbosa, M; Farshim, P;
Publication
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009
Abstract
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this technique to two of the most popular models adopted in literature (Bellare-Rogaway and Canetti-Krawczyk). We analyse previous results obtained using these models in light of the proposed extensions, and demonstrate their application to a new class of protocols. In the timed CK model we concentrate on modular design and analysis of protocols, and propose a more efficient timed authenticator relying on timestamps. The structure of this new authenticator implies that an authentication mechanism standardised in ISO-9798 is secure. Finally, we use our timed extension to the BR model to establish the security of an efficient ISO protocol for key transport and unilateral entity authentication.
2008
Authors
Correia, A; Pereira, J; Oliveira, R;
Publication
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PART I
Abstract
Shared-nothing clusters are a well known and cost-effective approach to database server scalability, in particular, with highly intensive read-only workloads typical of many 3-tier web-based applications. The common reliance oil a centralized component and a simplistic propagation strategy employed by mainstream solutions however conduct to poor scalability with traditional on-line transaction processing (OLTP), where the Update ratio is high. Such approaches also pose in additional obstacle to high availability while introducing a single point Of failure. More recently, database replication protocols based on group communication have been shown to overcome such limitations, expanding the applicability of shared-nothing Clusters to more demanding transactional workloads. These take simultaneous advantage of total order multicast and transactional semantics to improve oil mainstream solutions. However, none has already been widely deployed in a general purpose database management system. In this paper, we argue that it major hurdle for their acceptance is that these proposals have disappointing performance with specific subsets of real-world workloads. Such limitations are deep-rooted and working around them requires in-depth understanding of protocols and changes to applications. We address this issue with a novel protocol that combines multiple transaction execution mechanisms and replication techniques and then show how it avoids the identified pitfalls. Experimental results are obtained with it workload based oil the industry standard TPC-C benchmark.
2008
Authors
Goeschka, KM; Hallsteinsen, SO; Oliveira, R; Romanovsky, A;
Publication
Proceedings of the ACM Symposium on Applied Computing
Abstract
2008
Authors
Matos, M; Correia, A; Pereira, J; Oliveira, R;
Publication
APPLIED COMPUTING 2008, VOLS 1-3
Abstract
Adaptation of system parameters is acknowledged as a requirement to scalable and dependable distributed systems. Unfortunately, adaptation cannot be effective when provided solely by individual system components as the correct decision is often tied to the composition itself and the system as a whole. In fact, proper adaption is a cross-cutting issue: Diagnostic and feedback operations must target multiple components and do it at different abstraction levels. We address this problem with the SERPENTINE middleware platform. By relying on the industry standard JMX as a service interface, it can monitor and operate on a wide range of distributed middleware and application components. By building on a JMX-enabled OSGi runtime, SERPENTINE is able to control the life-cycle of components themselves. The scriptable stateless server and cascading architecture allow for increased dependability and flexibility.
2008
Authors
Pu, C; Kersten, M; Oliveira, R;
Publication
2nd Workshop on Dependable Distributed Data Management, WDDDM'08 - Affiliated with EuroSys 2008
Abstract
2008
Authors
Oliveira, RC;
Publication
EDOCW: 2008 12TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.