| FuDiCo II: S.O.S. Survivability: Obstacles and Solutions 2nd Bertinoro Workshop on Future Directions in Distributed Computing 
23-25 June 2004  | 
![]()  | 
|---|
      Keynote Lecture
       | 
    
|---|
|  Fred Schneider  Cornell University (USA)  | 
    
| Discussion | 
    
      Technical Session 1: Survivability and Privacy
      
       | 
    
|---|
| The Edge of
Privacy  V. Shmatikov SRI (USA)  | 
    
| 
	Survivability: Beyond Fault-Tolerance
	and Security    L. Zhou Microsoft Research (USA)  | 
    
| Modern Security
      with Traditional Distributed Algorithms  R. Guerraoui and M. Vukolic EPFL (Switzerland)  | 
    
| Discussion | 
    
 Technical Session 2:
      Measuring Robustness
       | 
    
|---|
| Statistical Monitoring + Predictable
Recovery = Self-*
 A Fox, E. Kiciman, D.A Patterson, R. Katz, M. Jordan, I. Stoica, and D. Tygar. Stanford University and UC Berkeley (USA)  | 
    
| Towards a
      framework for automated robustness evaluation of distributed
      services    D. Oppenheimer, V. Vatkovskiy, and D.A. Patterson UC Berkeley (USA)  | 
    
| Discussion | 
    
 Technical Session 3:
      Peer-to-peer Systems
       | 
    
|---|
| On designing
      incentives-compatible peer-to-peer systems  T.W. Ngan, A. Nandi, A. Singh, D.S. Wallach, P. Druschel Rice University (USA)  | 
    
| Limiting Duplicate
      Identities in Distributed Systems   E. Jaffe, D. Malkhi, E. Pavlov The Hebrew University of Jerusalem (Israel)  | 
    
| Discussion | 
    
      Technical Session 4: Survivable Storage
       | 
    
|---|
|  A protocol family
      approach to survivable storage infrastructures   J. Wylie, G.R. Goodson, G.R. Ganger, and M.K. Reiter CMU (USA)  | 
    
|   Optimal
      Resilience Wait-Free Storage from Byzantine Components: Inherent
      Costs and Solutions    G. Chokler, I. Keidar, and D. Malkhi MIT (USA), Technion (Israel) and The Hebrew University of Jerusalem (Israel)  | 
    
|  Byzantine Fault
      Tolerance in Long-Lived Systems   R. Rodrigues and B. Liskov MIT (USA)  | 
    
| Discussion | 
    
      Keynote Lecture
       | 
    
|---|
| 
	Carl Landwehr National Science Foundation (USA)  | 
    
| Discussion | 
    
      Technical Session 5: Gossip-based Protocols
       | 
    
|---|
|  Towards
       Survivability of Application-Level Multicast   G. Badishi, I. Keidar, and R. Melamed Technion (Israel)  | 
    
| 
      Detection and Removal of Malicious Peers in Gossip-Based
      Protocols   M. Jelasity, A. Montresor, and O. Babaoglu Università di Bologna (Italy)  | 
    
|  
      Self-Adapting Epidemic Broadcast Algorithms   L. Rodrigues and J. Pereira Universidade de Lisboa (Portugal)  | 
    
| Discussion | 
    
      Technical Session 6-I: Byzantine Protocols
       | 
    
|---|
|  Wormhole-Aware
      Byzantine Protocols   N. Ferreira Neves, M. Correia and Paulo Verissimo Universidade de Lisboa (Portugal)  | 
    
| 
	 Coping with the
	Insider Threat in Scalable Distributed Information Systems
	  C. Nita-Rotaru and Y. Amir Purdue University and Johns Hopkins University (USA)  | 
    
| Discussion | 
    
      Technical Session 6-II: Byzantine Protocols
       | 
    
|---|
| 
	 Distributing Trust on the
	Internet   C. Cachin IBM Research Zurich (Switzerland)  | 
    
| 
         Byzantine Replication for
        Trustworthy Systems   J.P. Martin and L. Alvisi UT Austin (USA)  | 
    
| Discussion | 
    
      Technical Session 7: Survivable Software
       | 
    
|---|
| 
	 Customizable and Adaptive
	Survivability  M. Hiltunen and R. Schlichting AT&T Research (USA)  | 
    
| 
	 Robust multi-threading  J. Napper and L. Alvisi UT Austin (USA)  | 
    
| 
	 Survivability of
	Operating Systems: Handling Vulnerabilities   N. Suri and A. Johansson TU Darmstadt (Germany)  | 
| Discussion | 
    
      Keynote Lecture
       | 
    
|---|
|  Jacques Stern  Ecole Normale Supérieure (France)  | 
    
| Discussion | 
    
      Technical Session 8: Solitaires
       | 
    
|---|
| Fault-Tolerant
      Forwarding in the Face of Malicious Routers   A.T. Mizrack, K. Marzullo, and S. Savage UC San Diego (USA)  | 
    
| Integrating End-to-end
      Security and Fault Tolerance  A. Myers Cornell University (USA)  | 
    
| Securely Improving
      Performance Through Speculative Predicitve Remote Execution
        B. Yee Google (USA)  | 
    
| Discussion |