| FuDiCo II: S.O.S. Survivability: Obstacles and Solutions 2nd Bertinoro Workshop on Future Directions in Distributed Computing
23-25 June 2004 |
![]() |
|---|
Keynote Lecture
|
|---|
| Fred Schneider Cornell University (USA) |
| Discussion |
Technical Session 1: Survivability and Privacy
|
|---|
| The Edge of
Privacy V. Shmatikov SRI (USA) |
|
Survivability: Beyond Fault-Tolerance
and Security L. Zhou Microsoft Research (USA) |
| Modern Security
with Traditional Distributed Algorithms R. Guerraoui and M. Vukolic EPFL (Switzerland) |
| Discussion |
Technical Session 2:
Measuring Robustness
|
|---|
| Statistical Monitoring + Predictable
Recovery = Self-*
A Fox, E. Kiciman, D.A Patterson, R. Katz, M. Jordan, I. Stoica, and D. Tygar. Stanford University and UC Berkeley (USA) |
| Towards a
framework for automated robustness evaluation of distributed
services D. Oppenheimer, V. Vatkovskiy, and D.A. Patterson UC Berkeley (USA) |
| Discussion |
Technical Session 3:
Peer-to-peer Systems
|
|---|
| On designing
incentives-compatible peer-to-peer systems T.W. Ngan, A. Nandi, A. Singh, D.S. Wallach, P. Druschel Rice University (USA) |
| Limiting Duplicate
Identities in Distributed Systems E. Jaffe, D. Malkhi, E. Pavlov The Hebrew University of Jerusalem (Israel) |
| Discussion |
Technical Session 4: Survivable Storage
|
|---|
| A protocol family
approach to survivable storage infrastructures J. Wylie, G.R. Goodson, G.R. Ganger, and M.K. Reiter CMU (USA) |
| Optimal
Resilience Wait-Free Storage from Byzantine Components: Inherent
Costs and Solutions G. Chokler, I. Keidar, and D. Malkhi MIT (USA), Technion (Israel) and The Hebrew University of Jerusalem (Israel) |
| Byzantine Fault
Tolerance in Long-Lived Systems R. Rodrigues and B. Liskov MIT (USA) |
| Discussion |
Keynote Lecture
|
|---|
|
Carl Landwehr National Science Foundation (USA) |
| Discussion |
Technical Session 5: Gossip-based Protocols
|
|---|
| Towards
Survivability of Application-Level Multicast G. Badishi, I. Keidar, and R. Melamed Technion (Israel) |
|
Detection and Removal of Malicious Peers in Gossip-Based
Protocols M. Jelasity, A. Montresor, and O. Babaoglu Università di Bologna (Italy) |
|
Self-Adapting Epidemic Broadcast Algorithms L. Rodrigues and J. Pereira Universidade de Lisboa (Portugal) |
| Discussion |
Technical Session 6-I: Byzantine Protocols
|
|---|
| Wormhole-Aware
Byzantine Protocols N. Ferreira Neves, M. Correia and Paulo Verissimo Universidade de Lisboa (Portugal) |
|
Coping with the
Insider Threat in Scalable Distributed Information Systems
C. Nita-Rotaru and Y. Amir Purdue University and Johns Hopkins University (USA) |
| Discussion |
Technical Session 6-II: Byzantine Protocols
|
|---|
|
Distributing Trust on the
Internet C. Cachin IBM Research Zurich (Switzerland) |
|
Byzantine Replication for
Trustworthy Systems J.P. Martin and L. Alvisi UT Austin (USA) |
| Discussion |
Technical Session 7: Survivable Software
|
|---|
|
Customizable and Adaptive
Survivability M. Hiltunen and R. Schlichting AT&T Research (USA) |
|
Robust multi-threading J. Napper and L. Alvisi UT Austin (USA) |
|
Survivability of
Operating Systems: Handling Vulnerabilities N. Suri and A. Johansson TU Darmstadt (Germany) |
| Discussion |
Keynote Lecture
|
|---|
| Jacques Stern Ecole Normale Supérieure (France) |
| Discussion |
Technical Session 8: Solitaires
|
|---|
| Fault-Tolerant
Forwarding in the Face of Malicious Routers A.T. Mizrack, K. Marzullo, and S. Savage UC San Diego (USA) |
| Integrating End-to-end
Security and Fault Tolerance A. Myers Cornell University (USA) |
| Securely Improving
Performance Through Speculative Predicitve Remote Execution
B. Yee Google (USA) |
| Discussion |