Abstract
The Globe Distribution Network (GDN) is an application for the efficient, worldwide distribution of freely redistributable software packages. Distribution is made efficient by encapsulating the software into special distributed objects which efficiently replicate themselves near to the downloading clients. The Globe Distribution Network takes a novel, optimistic approach to stop the illegal distribution of copyrighted and illicit material via the network. Instead of having moderators check the packages at upload time, illegal content is removed and its uploader's access to the network permanently revoked only when the violation is discovered. Other protective measures defend the GDN against internal and external attacks to its availability. By exploiting the replication of the software and using fault-tolerant server software, the Globe Distribution Network achieves high availability. A prototype implementation of the GDN is available from http://www.cs.vu.nl/globe/.
- Agha, G., Ed. 2002. Comm. ACM (Special Section on Adaptive Middleware) 45, 6 (June).]] Google Scholar
- Bakker, A. 2002. An object-based software distribution network. Ph.D. thesis, Division of Mathematics and Computer Science, Faculty of Sciences, Vrije Universiteit, Amsterdam, The Netherlands.]]Google Scholar
- Bakker, A., Amade, E., Ballintijn, G., Kuz, I., Verkaik, P., Van der Wijk, I., Van Steen, M., and Tanenbaum, A. 2000. The Globe Distribution Network. In Proceedings of the USENIX Annual Technical Conference (FREENIX track). San Diego, CA. 141--152.]] Google Scholar
- Bakker, A., Van Steen, M., and Tanenbaum, A. 2001. A law-abiding peer-to-peer network for free-software distribution. In Proceedings of the IEEE Symposium on Network Computing and Applications (NCA'01). Cambridge, MA, IEEE Computer Society, 60--67.]] Google Scholar
- Bakker, A., Van Steen, M., and Tanenbaum, A. 2003. A wide-area distribution network for free software. Tech. rep. IR-CS-002, Department of Computer Science, Vrije Universiteit Amsterdam. The Netherlands.]]Google Scholar
- Bakker, A., Van Steen, M., Tanenbaum, A., and Verkaik, P. 2003. Design and implementation of the Globe middleware. Tech. rep. IR-CS-003, Department of Computer Science, Vrije Universiteit Amsterdam, The Netherlands.]]Google Scholar
- Ballintijn, G., Van Steen, M., and Tanenbaum, A. 1999. Simple crash recovery in a wide-area location service. In Proceedings of the 12th International Conference on Parallel and Distributed Computing Systems. Fort Lauderdale, FL. 87--93.]]Google Scholar
- Ballintijn, G., Van Steen, M., and Tanenbaum, A. 2001. Scalable user-friendly resource names. IEEE Internet Comput. 5, 5 (Sept.), 20--27.]] Google Scholar
- Burk, D. 2001. Copyrightable functions and patentable speech. Comm. ACM 44, 2 (Feb.), 69--75.]] Google Scholar
- Carmody, P. 2002. The world's first illegal prime number? http://www.utm.edu/research/primes/curios/485...443.html.]]Google Scholar
- Chen, P., Lee, E., Gibson, G., Katz, R., and Patterson, D. 1994. RAID: High-performance, reliable secondary storage. ACM Comput. Surv. 26, 2 (June), 145--185.]] Google Scholar
- Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2002. Choosing reputable servents in a P2P network. In Proceedings of the 11th International World Wide Web Conference. Honolulu, HI.]] Google Scholar
- Crispo, B., Popescu, B., and Tanenbaum, A. 2004. Symmetric key authentication services revisited. In Proceedings of the 9th Australasian Conference on Information Security and Privacy (ACISP'04). Sydney, Australia.]]Google Scholar
- Cristian, F. 1991. Understanding fault-tolerant distributed systems. Comm. ACM 34, 2 (Feb.), 56--78.]] Google Scholar
- Dean, D. and Stubblefield, A. 2001. Using client puzzles to protect TLS. In Proceedings of the 10th USENIX Security Symposium. Washington, DC.]] Google Scholar
- Dierks, T. and Allen, C. 1999. The TLS Protocol Version 1.0. RFC 2246.]] Google Scholar
- Dongarra, J. 2004. The Netlib. http://www.netlib.org/.]]Google Scholar
- Free Software Foundation, Inc. 1991. GNU General Public License Version 2. http://www.fsf.org/licenses/gpl.txt.]]Google Scholar
- Grosse, E. and Dongarra, J. 1995. Subject: Notes to Netlib contributors. ftp://ftp.netlib.org/misc/contrib.]]Google Scholar
- Katzenbeisser, S. and Petitcolas, F., Eds. 1999. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, Norwood, MA.]] Google Scholar
- Kuz, I., Van Steen, M., and Sips, H. 2002. The Globe infrastructure directory service. Comput. Comm. 25, 9 (June). Elsevier Science, Amsterdam, The Netherlands. 835--845.]]Google Scholar
- Lethin, R. 2001. Reputation. In Peer-to-Peer: Harnessing the Power of Disruptive Technologies. A. Oram, Ed. O'Reilly and Associates, Sebastopol, CA. Chapter 17, 341--353.]]Google Scholar
- Neuman, B. C. 1994. Scale in distributed systems. In Readings in Distributed Computing Systems. T. Casavant and M. Singhal, Eds. IEEE Computer. Society.]]Google Scholar
- Nielsen, J. 1995. Multimedia and Hypertext: The Internet and Beyond. AP Professional, Boston, MA.]] Google Scholar
- Open Source Development Network. 2004a. SourceForge.net open source software development Web site. http://www.sf.net/.]]Google Scholar
- Open Source Development Network. 2004b. SourceForge.net terms and conditions of use. http://sourceforge.net/docman/display_doc.php?docid=6048&group_id=1.]]Google Scholar
- Oram, A., Ed. 2001. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly and Associates, Sebastopol, CA.]] Google Scholar
- Pierre, G., Van Steen, M., and Tanenbaum, A. 2002. Dynamically selecting optimal distribution strategies for Web documents. IEEE Trans. Comput. 51, 6 (June), 637--651.]] Google Scholar
- Plank, J., Beck, M., Kingsley, G., and Li, K. 1995. Libckpt: Transparent checkpointing under unix. In Proceedings of the USENIX Winter Technical Conference. New Orleans, LA. 213--223.]] Google Scholar
- Popescu, B., Crispo, B., and Tanenbaum, A. 2003a. A certificate revocation scheme for a large-scale highly replicated distributed system. In Proceedings of the 8th IEEE International Symposium on Computers and Communications (ISCC'03). Kemer-Antalya, Turkey, 225--232.]] Google Scholar
- Popescu, B., Crispo, B., Tanenbaum, A., and Zeeman, M. 2003b. Expressing security policies for distributed objects applications. In Proceedings of the 11th Cambridge International Workshop on Security Protocols. Cambridge, U.K.]]Google Scholar
- Popescu, B., Van Steen, M., and Tanenbaum, A. 2002. A security architecture for object-based distributed systems. In Proceedings of the 18th Annual Computer Security Applications Conference. Las Vegas, NV. 161--171.]] Google Scholar
- Saltzer, J., Reed, D., and Clark, D. 1984. End-to-end arguments in system design. ACM Trans. Comput. Syst. 2, 4 (Nov.), 277--288.]] Google Scholar
- Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38--47.]] Google Scholar
- Simons, B. 2000. From the President: To DVD or not to DVD. Comm. ACM 43, 5 (May), 31--32.]] Google Scholar
- Sivasubramanian, S., Pierre, G., and Van Steen, M. 2003. A case for dynamic selection of replication and caching strategies. In Proceedings of the 8th International Workshop on Web Content Caching and Distribution (WCW'03). Hawthorne, NY.]]Google Scholar
- Software in the Public Interest, Inc. 2004a. Debian GNU/Linux---Step 2: Identification. http://www.debian.org/devel/join/nm-step2.]]Google Scholar
- Software in the Public Interest, Inc. 2004b. Debian GNU/Linux---The Universal Operating System. http://www.debian.org/.]]Google Scholar
- Stelling, P., Foster, I., Kesselman, C., Lee, C., and von Laszewski, G. 1998. A fault detection service for wide area distributed computations. In Proceedings of the 7th IEEE Symposium on High Performance Distributed Computing. Chicago, IL. 268--278.]] Google Scholar
- Tridgell, A. 2000. Efficient algorithms for sorting and synchronization. Ph.D. thesis, Australian National University, Canberra, Australia.]]Google Scholar
- United States Government. 1998. Digital Millennium Copyright Act. United States Public Law No. 105-304.]]Google Scholar
- Van Steen, M., Hauck, F., and Tanenbaum, A. 1998. Locating objects in wide-area systems. IEEE Communications, 104--109.]]Google Scholar
- Van Steen, M., Homburg, P., and Tanenbaum, A. 1999. Globe: A wide-area distributed system. IEEE Concurrency 7, 1 (Jan.), 70--78.]] Google Scholar
- World Intellectual Property Organization. 1996. WIPO Copyright Treaty. In WIPO Diplomatic Conference on Certain Copyright and Neighbouring Rights Questions. Geneva, Switzerland. http://www.wipo.int/treaties/en/ip/wct/.]]Google Scholar
Index Terms
A wide-area Distribution Network for free software
Recommendations
Improving Wide-Area Replication Performance through Informed Leader Election and Overlay Construction
CLOUD '13: Proceedings of the 2013 IEEE Sixth International Conference on Cloud ComputingReplication is an important building block to achieve high availability in the presence of failures. Until recently, wide-area replication with strong consistency guarantees was regarded as impractical due to performance constraints. We investigate how ...
The P2P Wars: How Code Beat Law
Content owners have successfully held P2P software providers liable for their users' infringements in every major case they've brought, but those successes failed to reduce the range or availability of P2P file sharing software. By contrasting the law's ...
Access Control in Wide-Area Networks
ICDCS '97: Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS '97)Access control involves maintaining information about which users can access system resources and ensuring that access is restricted to authorized users. In wide-area networks such as the Internet, implementing access control is difficult, since ...






Comments