Automatic marshalling and unmarshalling of arguments and return values ... only objects identified as remotely accessible (Clouds, Argus, Arjuna, Java) ...
security manager can be set to allow mobile code access to local files etc. if a ... But users often require new programs, for example: New software installation ...
Public-key certificate for Bob's Bank. 1. Certificate type. Public key. 2. Name. Bob's Bank. 3. Public key. KBpub. 4. Certifying authority. Fred The Bankers ...
when partitions reconnected, inconsistencies detected and repaired. quorum consensus ... on reconnection, smaller partition brought up to date. virtual partition ...
shared information must be long-lived, so that it survives even when no-one is ... system ... (pointer swizzling), and maintain mapping between OID and POID ...
To encrypt text using the RSA method, the plaintext is divided into equal blocks ... stored document files as well as messages. To protect against forgery ...
Names are associated with interesting entities in a distributed system by a binding ... the tactical environment, where it is unwise to rely on the availability of any ...
shared information must be long-lived, so that it survives even when no-one is working on it ... passivate object into store. Flattening and Unflattening ...
Eve. Eavesdropper. Mallory. Malicious attacker. Sara. A server. Alice and Bob share a secret key KAB. ... communication: How does Bob know that any {Mi} isn't a ...
... completed our look at distributed file systems, which are an important category ... divided into arbitrarily nested directories. organizationally partitioned ...
efficiency, reliability, monitoring, hold-back, negative acknowledgement, ... used when it is essential to ensure that all processes in the group proceed in lock-step ...