The decentralized file system Igor-FS as an application for overlay-networks

[1]  Gilles Kahn,et al.  The Semantics of a Simple Language for Parallel Programming , 1974, IFIP Congress.

[2]  Ellen W. Zegura,et al.  Bootstrapping in Gnutella: A Measurement Study , 2004, PAM.

[3]  Thomas Fuhrmann A Self-organizing Routing Scheme for Random Networks , 2005, NETWORKING.

[4]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[5]  Douglas Thain,et al.  Transparent access to Grid resources for user software , 2006, Concurr. Comput. Pract. Exp..

[6]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[7]  K. Clarkson Nearest-Neighbor Searching and Metric Space Dimensions , 2005 .

[8]  Andrew Tridgell,et al.  Efficient Algorithms for Sorting and Synchronization , 1999 .

[9]  R. Card,et al.  Design and Implementation of the Second Extended Filesystem , 2001 .

[10]  Klaus Wehrle,et al.  Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.

[11]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[12]  Niels Ferguson,et al.  A Simple Algebraic Representation of Rijndael , 2001, Selected Areas in Cryptography.

[13]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[14]  David E. Culler,et al.  A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.

[15]  Thomas Fuhrmann,et al.  Bootstrapping locality-aware P2P networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[16]  Brad Curtis Johnson Subject: a Distributed Computing Environment Framework: an Osf Perspective , 1991 .

[17]  Rick Adams,et al.  Standard for interchange of USENET messages , 1987, RFC.

[18]  Maurice Lorrain Schlumberger,et al.  De bruijn communications networks. , 1974 .

[19]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[20]  Thomas Fuhrmann,et al.  Churn Resistant de Bruijn Networks for Wireless on Demand Systems , 2006 .

[21]  Mike Eisler XDR: External Data Representation Standard , 2006, RFC.

[22]  J Walker,et al.  SHARE IT !-A RIGHTS-MANAGED NETWORK OF PEER-TO-PEER SET-TOP-BOXES-SYSTEM ARCHITECTURE , 2003 .

[23]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[24]  Thomas Fuhrmann,et al.  Distributed Job Scheduling in a Peer-to-Peer Video Recording System , 2004, GI Jahrestagung.

[25]  Benoit des Ligneris,et al.  Virtualization of Linux based computers: the Linux-VServer project , 2005, 19th International Symposium on High Performance Computing Systems and Applications (HPCS'05).

[26]  Sam Hartman,et al.  The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2 , 2005, RFC.

[27]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[28]  Krishna P. Gummadi,et al.  The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.

[29]  Ralph C. Merkle,et al.  Secrecy, authentication, and public key systems , 1979 .

[30]  Brent Callaghan,et al.  NFS Version 3 Protocol Specification , 1995, RFC.

[31]  Robert Thurlow,et al.  RPC: Remote Procedure Call Protocol Specification Version 2 , 2009, RFC.

[32]  Burton S. Kaliski,et al.  The MD2 Message-Digest Algorithm , 1992, RFC.

[33]  Mahadev Satyanarayanan,et al.  Andrew: a distributed personal computing environment , 1986, CACM.

[34]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[35]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[36]  Hui Zhang,et al.  Predicting Internet network distance with coordinates-based approaches , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[37]  Song Jiang,et al.  Efficient distributed disk caching in data grid management , 2003, 2003 Proceedings IEEE International Conference on Cluster Computing.

[38]  Tatu Ylönen,et al.  The Secure Shell (SSH) Protocol Architecture , 2006, RFC.

[39]  Gurmeet Singh Manku,et al.  Symphony: Distributed Hashing in a Small World , 2003, USENIX Symposium on Internet Technologies and Systems.

[40]  Rudolf Bayer,et al.  Binary B-trees for virtual memory , 1971, SIGFIDET '71.

[41]  Aladdin Enterprises,et al.  ZLIB Compressed Data Format Specification version 3.3 , 1996 .

[42]  George D. Stamoulis,et al.  Distributed Scheduling of Recording Tasks with Interconnected Servers , 2004, NETWORKING.

[43]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[44]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[45]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.

[46]  David Robinson,et al.  Network File System (NFS) version 4 Protocol , 2003, RFC.

[47]  J. G. Fletcher,et al.  An Arithmetic Checksum for Serial Transmissions , 1982, IEEE Trans. Commun..

[48]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[49]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[50]  Moisés Aranda,et al.  the birthday problem , 2008 .

[51]  Daishi Kato,et al.  Evaluating DHT Implementations in Complex Environments by Network Emulator , 2007, IPTPS.

[52]  John Viega,et al.  The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.

[53]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[54]  Paul Francis,et al.  IDMaps: a global internet host distance estimation service , 2001, TNET.

[55]  Mahadev Satyanarayanan,et al.  Coda: A Highly Available File System for a Distributed Workstation Environment , 1990, IEEE Trans. Computers.

[56]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[57]  Antony Rowstron,et al.  Virtual ring routing: network routing inspired by DHTs , 2006, SIGCOMM 2006.

[58]  Ronald L. Rivest,et al.  The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms , 1996, RFC.

[59]  Clive D. W. Feather Network News Transfer Protocol (NNTP) , 2006, RFC.

[60]  Robert J. Sparks Actions Addressing Identified Issues with the Session Initiation Protocol's (SIP) Non-INVITE Transaction , 2006, RFC.

[61]  Ben Y. Zhao,et al.  Distributed Object Location in a Dynamic Network , 2004, Theory of Computing Systems.

[62]  Frank Yellin,et al.  The Java Virtual Machine Specification , 1996 .

[63]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[64]  Oskar Sandberg,et al.  Distributed Routing in Small-World Networks , 2006, ALENEX.

[65]  M. Newman Power laws, Pareto distributions and Zipf's law , 2005 .

[66]  John H. Howard,et al.  On Overview of the Andrew File System , 1988, USENIX Winter.

[67]  Robert Tappan Morris,et al.  Designing a DHT for Low Latency and High Throughput , 2004, NSDI.

[68]  Robert Tappan Morris,et al.  Bandwidth-efficient management of DHT routing tables , 2005, NSDI.

[69]  Philipp Obreiter,et al.  Lanes - A Lightweight Overlay for Service Discovery in Mobile Ad Hoc Networks , 2003 .

[70]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[71]  William Stallings,et al.  PGP Message Exchange Formats , 1996, RFC.

[72]  Steve Muir The Seven Deadly Sins of Distributed Systems , 2004, WORLDS.

[73]  Robert Devine,et al.  Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm , 1993, FODO.

[74]  L. Vivier,et al.  The new ext 4 filesystem : current status and future plans , 2007 .

[75]  Roger Faulkner,et al.  The Process File System and Process Model in UNIX System V , 1991, USENIX Winter.

[76]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[77]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[78]  Moni Naor,et al.  Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.

[79]  Russ Housley,et al.  Cryptographic Message Syntax (CMS) , 2002, RFC.

[80]  Paul England,et al.  The Darknet and the Future of Content Protection , 2002, Digital Rights Management Workshop.

[81]  W. Richard Stevens,et al.  Unix network programming , 1990, CCRV.

[82]  Lyndon Ong,et al.  An Introduction to the Stream Control Transmission Protocol (SCTP) , 2002, RFC.

[83]  Pierre L'Ecuyer,et al.  Tables of linear congruential generators of different sizes and good lattice structure , 1999, Math. Comput..

[84]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[85]  David Mazières,et al.  Democratizing Content Publication with Coral , 2004, NSDI.

[86]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[87]  Eric Allman,et al.  DomainKeys Identified Mail (DKIM) Signatures , 2007, RFC.

[88]  Mark Handley,et al.  Datagram Congestion Control Protocol (DCCP) , 2006, RFC.

[89]  Paolo Toth,et al.  Knapsack Problems: Algorithms and Computer Implementations , 1990 .

[90]  Emin Gün Sirer,et al.  Meridian: a lightweight network location service without virtual coordinates , 2005, SIGCOMM '05.

[91]  Frank Dabek,et al.  A cooperative file system , 2001 .

[92]  Brighten Godfrey,et al.  OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.

[93]  Ben Y. Zhao,et al.  Towards a Common API for Structured Peer-to-Peer Overlays , 2003, IPTPS.

[94]  Mario Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .

[95]  Bruce Schneier,et al.  Improved Cryptanalysis of Rijndael , 2000, FSE.

[96]  Thure Etzold,et al.  SRS - an indexing and retrieval tool for flat file data libraries , 1993, Comput. Appl. Biosci..

[97]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[98]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.

[99]  Arun Venkataramani,et al.  A structural approach to latency prediction , 2006, IMC '06.

[100]  Robert Tappan Morris,et al.  Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.

[101]  Frank B. Schmuck,et al.  GPFS: A Shared-Disk File System for Large Computing Clusters , 2002, FAST.

[102]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[103]  Qi Xia,et al.  Fully decentralized DHT based approach to grid service discovery using overlay networks , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[104]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[105]  David R. Karger,et al.  Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.

[106]  John Linn,et al.  Generic Security Service Application Program Interface Version 2, Update 1 , 2000, RFC.

[107]  Jon Postel,et al.  Internet Control Message Protocol , 1981, RFC.

[108]  Dietmar Kaletta,et al.  Improved adaptive replacement algorithm for disk caches in HSM systems , 1999, 16th IEEE Symposium on Mass Storage Systems in cooperation with the 7th NASA Goddard Conference on Mass Storage Systems and Technologies (Cat. No.99CB37098).

[109]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[110]  Burton S. Kaliski,et al.  PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.

[111]  Ross W. Callon The Twelve Networking Truths , 1996, RFC.

[112]  Erez Petrank,et al.  Implementing an on-the-fly garbage collector for Java , 2000, ISMM '00.

[113]  Ben Y. Zhao,et al.  Pond: The OceanStore Prototype , 2003, FAST.

[114]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[115]  Jörg Widmer,et al.  Extremum Feedback with Partial Knowledge , 2003, Networked Group Communication.

[116]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[117]  Douglas Thain,et al.  Parrot: Transparent User-Level Middleware for Data-Intensive Computing , 2005, Scalable Comput. Pract. Exp..

[118]  Thomas Fuhrmann,et al.  Measuring Large Overlay Networks - The Overnet Example , 2005, KiVS.

[119]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[120]  Francois Yergeau,et al.  UTF-8, a transformation format of ISO 10646 , 1998, RFC.

[121]  Larry L. Peterson,et al.  Reliability and Security in the CoDeeN Content Distribution Network , 2004, USENIX Annual Technical Conference, General Track.

[122]  Burton S. Kaliski,et al.  PKCS #7: Cryptographic Message Syntax Version 1.5 , 1998, RFC.

[123]  Hans-Joachim Hof,et al.  A Generic, Self-organizing, and Distributed Bootstrap Service for Peer-to-Peer Networks , 2007, IWSOS.

[124]  P. Biondi,et al.  Silver Needle in the Skype , 2006 .

[125]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[126]  Robert Tappan Morris,et al.  Practical, distributed network coordinates , 2004, Comput. Commun. Rev..

[127]  Jon M. Kleinberg,et al.  The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.

[128]  Stephen Tweedie,et al.  Planned Extensions to the Linux Ext2/Ext3 Filesystem , 2002, USENIX Annual Technical Conference, FREENIX Track.

[129]  Witold Litwin,et al.  LH*—a scalable, distributed data structure , 1996, TODS.

[130]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[131]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[132]  Satish Rao,et al.  A note on the nearest neighbor in growth-restricted metrics , 2004, SODA '04.

[133]  Richard M. Karp,et al.  Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..

[134]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.