Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorSnook, J.F.
dc.date.accessioned2009-06-17T09:24:49Z
dc.date.available2009-06-17T09:24:49Z
dc.date.issued2003
dc.identifier.citationChristianson , B & Snook , J F 2003 , ' Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing ' , Lecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics , vol. 10 , pp. 51-56 . https://doi.org/10.1007/b94819
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 96274
dc.identifier.otherPURE UUID: 6967e781-a318-43f2-a26e-25856f9e7ead
dc.identifier.otherdspace: 2299/3596
dc.identifier.otherScopus: 35048900631
dc.identifier.urihttp://hdl.handle.net/2299/3596
dc.description“The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA]
dc.description.abstractIn this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing distributed between mutually suspicious domains without a common management hierarchy. Our approach to availability is to structure documents into small components called folios in such a way as to allow the maximum opportunity for concurrent processing, and to allow these components to be freely replicated and distributed. Integrity conflicts are resolved using an optimistic form of control called optimistic integrity control (OIC) applied to recoverable work units. Our approach to security is to shrinkwrap the document components using cryptographic checksums, and to provide a set of building block components called functionaries which a group of users can combine in such a way as to provide each user with a means of ensuring that an agreed notion of integrity is enforced while relying upon a minimum of non-local trust. In particular, we do not rely upon a trusted computing base or a shared system infrastructure. The local availability of document versions and of the resources to process them are completely under local user control. The lack of availability of the functionaries does not have severe consequences, and the presence of mutual suspicion makes it easier to ensure that users can trust the functionaries to provide the intended service. A major benefit of using OIC is that it allows the integration of untrusted components such as filestores and directory servers into the system. In particular, an untrusted soft locking service can be used in order to reduce the number of concurrency conflicts, and untrusted security components can be used to screen out attempted access control violations.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
dc.titleShrink-Wrapped Optimism: The DODA Approach to Distributed Document Processingen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecordhttps://doi.org/10.1007/b94819
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record