Dependable Distributed Computing Term Paper

Pages: 3 (870 words)  ·  Style: APA  ·  Bibliography Sources: 6  ·  File: .docx  ·  Topic: Education - Computers

¶ … Distribution Systems with a Concentration on Cyber Foraging

Cyber foraging and the quantification of trust in context-aware Web Applications: A Performance Assessment of Caching Trust vs. Hoarding Content


The use of cyber foraging as a mechanism for enabling Internet-aware mobile devices of all types to interconnect with data staging servers shows significant potential for creating composite applications in real time, in addition to updating content taxonomies defined by mobile device users. Content taxonomies could potentially include social networking, consumer-generated media feeds including blogs, and news feeds enabled through RSS. The definition and fine-tuning of content taxonomies on mobile devices is in its nascent stages today yet growing rapidly due to the sophistication of mobile devices; however a corresponding operating architecture with greater breadth and agility is needed. Caching trust, or the ability to sufficiently cache knowledge vs. hoarding content is a fundamental design decision in this architecture, and the design dichotomy addressed in these suggested research topics.


M. Satyanarayanan, Caching Trust Rather Than Content. M. Satyanarayanan. School of Computer Science, Carnegie Mellon University, Operating Systems Review. Volume 34, No. 4, October 2000

Buy full Download Microsoft Word File paper
for $19.77
The author of this paper presents the concept of caching as it has typically applied to the performance of computing systems, mentioning the concept of how this concept decreases latency and makes network failures transparent at the user level of networks. The author contends that in mobile-based environments that would have the ability to deliver composite application components, entire applications and a wide variety of content-based applets, RSS and real-time newsfeeds through cyber foraging-based delivery mechanisms with data staging servers there is the fundamental decision of whether to hoard or cache content, and further, the author introduces the concept of caching trust.

Term Paper on Dependable Distributed Computing Assignment

In this case, it is the assumption that all data of potential interest can be hoarded on the mobile client [1, 2, 4]. In other words, such clients have to be prepared to cope with cache misses during normal use. If they are able to cache trust, then any untrusted site in the fixed infrastructure can be used to stage data for servicing cache misses -- one does not have to go back to a distant server, nor does one have to compromise security. (p. 1)."

Satyanarayanan goes on to mention the concepts of privacy being protected through the use of per-file private encryption keys to protect content on data staging servers and the use of a digital fingerprint to authenticate the content for use on the remote server. Satyanarayanan defines the security method as follows:

It is simple to extend this idea to privacy. In addition… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (3 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Dependable Distributed Systems Term Paper

Using Cloud Computing to Combat DDOS Attacks Research Paper

Risk Management and Analysis Process and Policy Before Technology Research Proposal

Promising Phenomenon Dissertation

Hypervisors Analysis of Virtualization Term Paper

View 200+ other related papers  >>

How to Cite "Dependable Distributed Computing" Term Paper in a Bibliography:

APA Style

Dependable Distributed Computing.  (2007, December 20).  Retrieved April 4, 2020, from

MLA Format

"Dependable Distributed Computing."  20 December 2007.  Web.  4 April 2020. <>.

Chicago Style

"Dependable Distributed Computing."  December 20, 2007.  Accessed April 4, 2020.