Principles of Distributed Systems


Book Description

This book constitutes the thoroughly refereed post-proceedings of the 8th International Conference on Principles of Distributed Systems, OPODIS 2004, held at Grenoble, France, in December 2004. The 30 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on design of distributed systems, ad-hoc networks and mobile agents, grid and networks, security, distributed algorithms, self-stabilization, sensor networks, and task/resource allocation.




Distributed Computing


Book Description

This book constitutes the refereed proceedings of the 26th International Symposium on Distributed Computing, DISC 2012, held in Salvador, Brazil, in October 2012. The 27 revised full papers presented together with 24 brief announcements were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on shared memory, mobile agents and overlay networks, wireless and multiple access channel networks, dynamic networks, distributed graph algorithms, wireless and loosely connected networks, robots, and lower bounds and separation.




Distributed Computing and Networking


Book Description

This book constitutes the refereed proceedings of the 14th International Conference on Distributed Computing and Networking, ICDCN 2013, held in Mumbai, India, during January 3-6, 2013. The 27 revised full papers, 5 short papers presented together with 7 poster papers were carefully reviewed and selected from 149 submissions. The papers cover topics such as distributed algorithms and concurrent data structures; integration of heterogeneous wireless and wired networks; distributed operating systems; internetworking protocols and internet applications; distributed database systems; mobile and pervasive computing, context-aware distributed systems; embedded distributed systems; next generation and converged network architectures; experiments and performance evaluation of distributed systems; overlay and peer-to-peer networks and services; fault-tolerance, reliability, and availability; home networking and services; multiprocessor and multi-core architectures and algorithms; resource management and quality of service; self-organization, self-stabilization, and autonomic computing; network security and privacy; high performance computing, grid computing, and cloud computing; energy-efficient networking and smart grids; security, cryptography, and game theory in distributed systems; sensor, PAN and ad-hoc networks; and traffic engineering, pricing, network management.




Cyber-Security in Critical Infrastructures


Book Description

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors’ experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.




Distributed Computing


Book Description

DISC, the International Symposium on Distributed Computing, is an annual forum for presentation of research on all aspects of distributed computing, - cluding the theory, design, implementation and applications of distributed - gorithms, systems and networks. The 22nd edition of DISC was held during September 22-24, 2008, in Arcachon, France. There were 101 submissions submitted to DISC this year and this volume contains 33 15-page-long regular papers selected by the Program Committee among these submissions. Every submitted paper was read and evaluated by ProgramCommittee membersassistedby externalreviewers.The ?nal decisions regarding acceptance or rejection of each paper were made during the electronic Program Committee meeting held during June 2008. Revised and expanded versions of a few best selected papers will be considered for publication in a special issue of the journal Distributed Computing. The Program Committee selected Robert Danek and Wojciech Golab as the recipientsofthis year'sBestPaperAwardfortheir paper “Closingthe Compl- ity Gap Between FCFS Mutual Exclusion and Mutual Exclusion.”The Program Committee selected Wojciech Wawrzyniak as the recipient of this year's Best Student Paper Award for the paper “Fast Distributed Approximations in P- nar Graphs” coauthored with Andrzej Czygrinow and Michal Han´ ´ckowiak.







Information Theoretic Security


Book Description

This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011. The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones.




Performance Characterization and Benchmarking


Book Description

This book constitutes the refereed post-proceedings of the 5th TPC Technology Conference, TPCTC 2013, held in Trento, Italy, in August 2013. It contains 7 selected peer-reviewed papers, a report from the TPC Public Relations Committee and one invited paper. The papers present novel ideas and methodologies in performance evaluation, measurement and characterization.