Outline of Topics

Global Computing
(CIS 700/2, Spring 2001)

1   Background

1.1   Pi-calculus (and lambda-calculus)

Readings: Foundational Calculi for Programming Languages, Benjamin C. Pierce. CRC Handbook of Computer Science and Engineering, 1996.

1.2   Ambients

Luca Cardelli and Andrew D. Gordon, Mobile Ambients. Foundations of Software Science and Computational Structures, Maurice Nivat (Ed.), Lecture Notes in Computer Science, Vol. 1378, Springer, 1998. pp. 140-155.

Luca Cardelli, Abstractions for Mobile Computation. Jan Vitek and Christian Jensen, Editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Lecture Notes in Computer Science, Vol. 1603, Springer, 1999. ISBN 3-540-66130-1. pp. 51-94.

1.3   Join-calculus

Readings: Cédric Fournet, Georges Gonthier, Jean-Jacques Lvy, Luc Maranget, and Didier Rémy. ``A calculus of mobile agents.'' Proceedings CONCUR'96 (LNCS 1119).

2   Trust

2.1   Seal-calculus

Readings: Jan Vitek and Giuseppe Castagna. Seal: A framework for secure mobile computations. In Internet Programming Languages, 1999.

2.2   Economic agents

  1. Michael Wooldridge and Paolo Ciancarini, Agent-Oriented Software Engineering: The State of the Art (Skim)
  2. Mark Miller and Eric Drexler, Markets and computation: Agoric open systems. (Sections 1-3 only)
  3. Mojo Nation website (concentrating on How it works and Technical overview pages)
  4. Mariposa: A Wide-Area Distributed Database System, Michael Stonebraker, Paul M. Aoki, Avi Pfeffer, Adam Sah, Jeff Sidell, Carl Staelin, and Andrew Yu. VLDB Journal 5, 1 (Jan. 1996), p. 48-63.
Supplementary readings:
  1. D. F. Ferguson, C. Nikolaou, J. Sairamesh, and Y. Yemini, Economic Models for Allocating Resources in Computer Systems. In Market based Control of Distributed Systems, Ed. Scott Clearwater, World Scientific Press, 1996.

2.3   Trust Management

  1. Butler Lampson. Authentication in Distributed Systems. In Distributed Systems, edited by Sape Mullender. Addison-Wesley, 1993.

  2. Policy-directed certificate retrieval. Carl Gunter and Trevor Jim. Software, Practice and Experience, 2000.

  3. I. Clarke, O. Sandberg, B. Wiley, and T.W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, in Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California. Springer: New York (2001).
Supplementary readings: Lampson's paper was generally found to be rather hard going. The following are helpful supplements:

2.4   Active Networks

  1. Safety and Security of Programmable Network Infrastructures. D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, and Jonathan M. Smith. IEEE Communications Magazine, issue on Programmable Networks, vol. 36, no. 10, pp. 84 - 92.
  2. A Secure PLAN. Michael Hicks and Angelos D. Keromytis. IWAN 99.

3   Agreement and Fault Tolerance

3.1   Distributed agreement


3.2   Transactions

Readings: Supplementary readings: Other topics and possible readings:

4   Additional Topics (time permitting)

4.1   Service Combinators

Readings: Luca Cardelli and Rowan Davies. Service Combinators for Web Computing. IEEE Transactions on Software Engineering, Vol 25, No 3, May-June 1999. pp 309-316.

4.2   XML (1-3 meetings)

(Guest lecture by Wadler?)

4.3   Network Objects (1-3 meetings)

Readings: Network Objects. Andrew Birrell, Greg Nelson, Susan Owicki, and Edward Wobber. Software--Practice and Experience, 25(S4), 1995, pp. 87--130.

Supplementary readings: A Language With Distributed Scope. Luca Cardelli. Computing Systems Journal, 8(1), 1995, pp. 27--59.

(possibly also discuss secure network objects)

4.4   Mobility

Readings: Old wine in new bottles, ...

4.5   Other readings that may be useful

Global Computing Seminar (CIS 700/2, Spring 2001), Benjamin C. Pierce.