diff options
author | Nils Gillmann <ng0@n0.is> | 2018-10-09 20:56:13 +0000 |
---|---|---|
committer | Nils Gillmann <ng0@n0.is> | 2018-10-09 20:56:13 +0000 |
commit | b07d449505e5a704f70bc5ef8dd6bb999e10d2ba (patch) | |
tree | 9cc6705fe10cf69783911e35bdef618bc37d79f0 | |
parent | 758465dbaf37d01c8d2709acbb29d4af5b56d1c0 (diff) | |
download | gnunetbib-b07d449505e5a704f70bc5ef8dd6bb999e10d2ba.tar.gz gnunetbib-b07d449505e5a704f70bc5ef8dd6bb999e10d2ba.zip |
umlaute
Signed-off-by: Nils Gillmann <ng0@n0.is>
-rw-r--r-- | gnunetbib.bib | 52 |
1 files changed, 26 insertions, 26 deletions
diff --git a/gnunetbib.bib b/gnunetbib.bib index 606faab..776446b 100644 --- a/gnunetbib.bib +++ b/gnunetbib.bib | |||
@@ -111,7 +111,7 @@ | |||
111 | year = {2016}, | 111 | year = {2016}, |
112 | month = apr, | 112 | month = apr, |
113 | pages = {0--103}, | 113 | pages = {0--103}, |
114 | school = {Humboldt-Universitaet zu Berlin}, | 114 | school = {Humboldt-Universit{\"a}t zu Berlin}, |
115 | type = {Diplomarbeit}, | 115 | type = {Diplomarbeit}, |
116 | address = {Berlin}, | 116 | address = {Berlin}, |
117 | abstract = {This thesis studies the GNUnet project comprising its history, ideas and the P2P network technology. It specifically investigates the question of emancipatory potentials with regard to forms of information power due to a widely deployed new Internet technology and tries to identify essential suspensions of power within the scope of an impact assessment. Moreover, we will see by contrasting the GNUnet project with the critical data protection project, founded on social theory, that both are heavily concerned about the problem of illegitimate and unrestrained information power, giving us additional insights for the assessment. Last but least I'll try to present a scheme of how both approaches may interact to realize their goals}, | 117 | abstract = {This thesis studies the GNUnet project comprising its history, ideas and the P2P network technology. It specifically investigates the question of emancipatory potentials with regard to forms of information power due to a widely deployed new Internet technology and tries to identify essential suspensions of power within the scope of an impact assessment. Moreover, we will see by contrasting the GNUnet project with the critical data protection project, founded on social theory, that both are heavily concerned about the problem of illegitimate and unrestrained information power, giving us additional insights for the assessment. Last but least I'll try to present a scheme of how both approaches may interact to realize their goals}, |
@@ -167,9 +167,9 @@ | |||
167 | year = {2015}, | 167 | year = {2015}, |
168 | month = dec, | 168 | month = dec, |
169 | pages = {0--69}, | 169 | pages = {0--69}, |
170 | school = {Technische Universitaet Muenchen}, | 170 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
171 | type = {Master}, | 171 | type = {Master}, |
172 | address = {Muenchen}, | 172 | address = {M{\"u}nchen}, |
173 | abstract = {Byzantine consensus is a fundamental and well-studied problem in the area of distributed system. It requires a group of peers to reach agreement on some value, even if a fraction of the peers is controlled by an adversary. This thesis proposes set union consensus, an efficient generalization of Byzantine consensus from single elements to sets. This is practically motivated by Secure Multiparty Computation protocols such as electronic voting, where a large set of elements must be collected and agreed upon. Existing practical implementations of Byzantine consensus are typically based on state machine replication and not well-suited for agreement on sets, since they must process individual agreements on all set elements in sequence. We describe and evaluate our implementation of set union consensus in GNUnet, which is based on a composition of Eppstein set reconciliation protocol with the simple gradecast consensus prococol described by Ben-Or}, | 173 | abstract = {Byzantine consensus is a fundamental and well-studied problem in the area of distributed system. It requires a group of peers to reach agreement on some value, even if a fraction of the peers is controlled by an adversary. This thesis proposes set union consensus, an efficient generalization of Byzantine consensus from single elements to sets. This is practically motivated by Secure Multiparty Computation protocols such as electronic voting, where a large set of elements must be collected and agreed upon. Existing practical implementations of Byzantine consensus are typically based on state machine replication and not well-suited for agreement on sets, since they must process individual agreements on all set elements in sequence. We describe and evaluate our implementation of set union consensus in GNUnet, which is based on a composition of Eppstein set reconciliation protocol with the simple gradecast consensus prococol described by Ben-Or}, |
174 | www_section = {byzantine consensus, GNUnet, secure multiparty computation, set reconciliation, voting}, | 174 | www_section = {byzantine consensus, GNUnet, secure multiparty computation, set reconciliation, voting}, |
175 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ma_dold_consensus_21dec2015.pdf}, | 175 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ma_dold_consensus_21dec2015.pdf}, |
@@ -182,7 +182,7 @@ | |||
182 | year = {2015}, | 182 | year = {2015}, |
183 | month = jan, | 183 | month = jan, |
184 | institution = {GNUnet e.V}, | 184 | institution = {GNUnet e.V}, |
185 | address = {Muenchen}, | 185 | address = {M{\"u}nchen}, |
186 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, | 186 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, |
187 | journal = {unknown}, | 187 | journal = {unknown}, |
188 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-es.pdf}, | 188 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-es.pdf}, |
@@ -195,7 +195,7 @@ | |||
195 | year = {2015}, | 195 | year = {2015}, |
196 | month = jan, | 196 | month = jan, |
197 | institution = {GNUnet e.V}, | 197 | institution = {GNUnet e.V}, |
198 | address = {Muenchen}, | 198 | address = {M{\"u}nchen}, |
199 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, | 199 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, |
200 | journal = {unknown}, | 200 | journal = {unknown}, |
201 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-it.pdf}, | 201 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-it.pdf}, |
@@ -208,7 +208,7 @@ | |||
208 | year = {2015}, | 208 | year = {2015}, |
209 | month = jan, | 209 | month = jan, |
210 | institution = {GNUnet e.V}, | 210 | institution = {GNUnet e.V}, |
211 | address = {Muenchen}, | 211 | address = {M{\"u}nchen}, |
212 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, | 212 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, |
213 | journal = {unknown}, | 213 | journal = {unknown}, |
214 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-fr.pdf}, | 214 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-fr.pdf}, |
@@ -221,7 +221,7 @@ | |||
221 | year = {2015}, | 221 | year = {2015}, |
222 | month = jan, | 222 | month = jan, |
223 | institution = {GNUnet e.V}, | 223 | institution = {GNUnet e.V}, |
224 | address = {Muenchen}, | 224 | address = {M{\"u}nchen}, |
225 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN, TLS}, | 225 | www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN, TLS}, |
226 | journal = {unknown}, | 226 | journal = {unknown}, |
227 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-en.pdf}, | 227 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-en.pdf}, |
@@ -356,9 +356,9 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each | |||
356 | year = {2014}, | 356 | year = {2014}, |
357 | month = feb, | 357 | month = feb, |
358 | pages = {0--106}, | 358 | pages = {0--106}, |
359 | school = {Technische Universitaet Muenchen}, | 359 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
360 | type = {Masters}, | 360 | type = {Masters}, |
361 | address = {Garching bei Muenchen}, | 361 | address = {Garching bei M{\"u}nchen}, |
362 | abstract = {As a means of reducing power consumption, hardware devices are capable to enter into sleep-states that have low power consumption. Waking up from those states in order to return to work is typically a rather energy-intensive activity. Some existing applications have non-urgent tasks that currently force hardware to wake up needlessly or prevent it from going to sleep. It would be better if such non-urgent activities could be scheduled to execute when the respective devices are active to maximize the duration of sleep-states. This requires cooperation between applications and the kernel in order to determine when the execution of a task will not be expensive in terms of power consumption. | 362 | abstract = {As a means of reducing power consumption, hardware devices are capable to enter into sleep-states that have low power consumption. Waking up from those states in order to return to work is typically a rather energy-intensive activity. Some existing applications have non-urgent tasks that currently force hardware to wake up needlessly or prevent it from going to sleep. It would be better if such non-urgent activities could be scheduled to execute when the respective devices are active to maximize the duration of sleep-states. This requires cooperation between applications and the kernel in order to determine when the execution of a task will not be expensive in terms of power consumption. |
363 | This work presents the design and implementation of Cryogenic, a POSIX-compatible API that enables clustering tasks based on the hardware activity state. Specifically, Cryogenic's API allows applications to defer their execution until other tasks use the device they want to use. As a result, two actions that contribute to reduce the device energy consumption are achieved: reduce the number of hardware wake-ups and maximize the idle periods. | 363 | This work presents the design and implementation of Cryogenic, a POSIX-compatible API that enables clustering tasks based on the hardware activity state. Specifically, Cryogenic's API allows applications to defer their execution until other tasks use the device they want to use. As a result, two actions that contribute to reduce the device energy consumption are achieved: reduce the number of hardware wake-ups and maximize the idle periods. |
364 | The energy measurements enacted at the end of this thesis demonstrate that, for the specific setup and conditions present during our experimentation, Cryogenic is capable to achieve savings between 1\% and 10\% for a USB WiFi device. | 364 | The energy measurements enacted at the end of this thesis demonstrate that, for the specific setup and conditions present during our experimentation, Cryogenic is capable to achieve savings between 1\% and 10\% for a USB WiFi device. |
@@ -375,9 +375,9 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each | |||
375 | year = {2014}, | 375 | year = {2014}, |
376 | month = aug, | 376 | month = aug, |
377 | pages = {0--49}, | 377 | pages = {0--49}, |
378 | school = {Technische Universitaet Muenchen}, | 378 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
379 | type = {Bachelor's}, | 379 | type = {Bachelor's}, |
380 | address = {Muenchen}, | 380 | address = {M{\"u}nchen}, |
381 | abstract = {Elections are a vital tool for decision-making in democratic societies. The past decade has witnessed a handful of attempts to apply modern technology to the election process in order to make it faster and more cost-effective. | 381 | abstract = {Elections are a vital tool for decision-making in democratic societies. The past decade has witnessed a handful of attempts to apply modern technology to the election process in order to make it faster and more cost-effective. |
382 | Most of the practical efforts in this area have focused on replacing traditional voting booths with electronic terminals, but did not attempt to apply cryptographic techniques able to guarantee critical properties of elections such as secrecy of ballot and verifiability. While such techniques were extensively researched in the past 30 years, practical implementation of cryptographically secure remote electronic voting schemes are not readily available. All existing implementation we are aware of either exhibit critical security flaws, are proprietary black-box systems or require additional physical assumptions such as a preparatory key ceremony executed by the election officials. The latter makes such systems unusable for purely digital communities. | 382 | Most of the practical efforts in this area have focused on replacing traditional voting booths with electronic terminals, but did not attempt to apply cryptographic techniques able to guarantee critical properties of elections such as secrecy of ballot and verifiability. While such techniques were extensively researched in the past 30 years, practical implementation of cryptographically secure remote electronic voting schemes are not readily available. All existing implementation we are aware of either exhibit critical security flaws, are proprietary black-box systems or require additional physical assumptions such as a preparatory key ceremony executed by the election officials. The latter makes such systems unusable for purely digital communities. |
383 | This thesis describes the design and implementation of an electronic voting system in GNUnet, a framework for secure and decentralized networking. We provide a short survey of voting schemes and existing implementations. The voting scheme we implemented makes use of threshold cryptography, a technique which requires agreement among a large subset of the election officials to execute certain cryptographic operations. Since such protocols have applications outside of electronic voting, we describe their design and implementation in GNUnet separately}, | 383 | This thesis describes the design and implementation of an electronic voting system in GNUnet, a framework for secure and decentralized networking. We provide a short survey of voting schemes and existing implementations. The voting scheme we implemented makes use of threshold cryptography, a technique which requires agreement among a large subset of the election officials to execute certain cryptographic operations. Since such protocols have applications outside of electronic voting, we describe their design and implementation in GNUnet separately}, |
@@ -573,9 +573,9 @@ This thesis also describes Knock, a free software implementation of TCP Stealth | |||
573 | year = {2014}, | 573 | year = {2014}, |
574 | month = feb, | 574 | month = feb, |
575 | pages = {0--91}, | 575 | pages = {0--91}, |
576 | school = {Technische Universitaet Muenchen}, | 576 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
577 | type = {Masters}, | 577 | type = {Masters}, |
578 | address = {Garching bei Muenchen}, | 578 | address = {Garching bei M{\"u}nchen}, |
579 | abstract = {The successful operation of a peer-to-peer network depends on the resilience of its peer's | 579 | abstract = {The successful operation of a peer-to-peer network depends on the resilience of its peer's |
580 | communications. On the Internet, direct connections between peers are often limited by restrictions like NATs and traffic filtering. Addressing such problems is particularly pressing for peer-to-peer networks that do not wish to rely on any trusted infrastructure, which might otherwise help the participants establish communication channels. Modern peer-to-peer networks employ various techniques to address the problem of restricted connectivity on the Internet. One interesting development is that various overlay networks now support multiple communication protocols to improve resilience and counteract service degradation. | 580 | communications. On the Internet, direct connections between peers are often limited by restrictions like NATs and traffic filtering. Addressing such problems is particularly pressing for peer-to-peer networks that do not wish to rely on any trusted infrastructure, which might otherwise help the participants establish communication channels. Modern peer-to-peer networks employ various techniques to address the problem of restricted connectivity on the Internet. One interesting development is that various overlay networks now support multiple communication protocols to improve resilience and counteract service degradation. |
581 | 581 | ||
@@ -598,9 +598,9 @@ The design is evaluated with the help of simulation and a realistic implementati | |||
598 | year = {2014}, | 598 | year = {2014}, |
599 | month = feb, | 599 | month = feb, |
600 | pages = {0--65}, | 600 | pages = {0--65}, |
601 | school = {Technische Universitaet Muenchen}, | 601 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
602 | type = {Bachelor's}, | 602 | type = {Bachelor's}, |
603 | address = {Garching bei Muenchen}, | 603 | address = {Garching bei M{\"u}nchen}, |
604 | abstract = {Linear programming (LP) has numerous applications in different fields. In some scenarios, e.g. supply chain master planning (SCMP), the goal is solving linear programs involving multiple parties reluctant to sharing their private information. In this case, methods from the area of secure multi-party computation (SMC) can be used. Secure multi-party versions of LP solvers have been known to be impractical due to high communication complexity. To overcome this, solutions based on problem transformation have been put forward. | 604 | abstract = {Linear programming (LP) has numerous applications in different fields. In some scenarios, e.g. supply chain master planning (SCMP), the goal is solving linear programs involving multiple parties reluctant to sharing their private information. In this case, methods from the area of secure multi-party computation (SMC) can be used. Secure multi-party versions of LP solvers have been known to be impractical due to high communication complexity. To overcome this, solutions based on problem transformation have been put forward. |
605 | 605 | ||
606 | In this thesis, one such algorithm, proposed by Dreier and Kerschbaum, is discussed, implemented, and evaluated with respect to numerical stability and scalability. Results | 606 | In this thesis, one such algorithm, proposed by Dreier and Kerschbaum, is discussed, implemented, and evaluated with respect to numerical stability and scalability. Results |
@@ -686,9 +686,9 @@ This paper maps the design space and gives design requirements for censorship re | |||
686 | year = {2013}, | 686 | year = {2013}, |
687 | month = jun, | 687 | month = jun, |
688 | pages = {0--76}, | 688 | pages = {0--76}, |
689 | school = {Technische Universitaet Muenchen}, | 689 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
690 | type = {Masters }, | 690 | type = {Masters }, |
691 | address = {Garching bei Muenchen}, | 691 | address = {Garching bei M{\"u}nchen}, |
692 | abstract = {Evaluations of P2P protocols during the system's design and implementation phases are commonly done through simulation and emulation respectively. While the current state-of-the-art simulation allows evaluations with many millions of peers through the use of abstractions, emulation still lags behind as it involves executing the real implementation at some parts of the system. This difference in scales can make it hard to relate the evaluations made created with simulation and emulation during the design and implementation phases and can results in a limited evaluation of the implementation, which may cause severe problems after deployment. | 692 | abstract = {Evaluations of P2P protocols during the system's design and implementation phases are commonly done through simulation and emulation respectively. While the current state-of-the-art simulation allows evaluations with many millions of peers through the use of abstractions, emulation still lags behind as it involves executing the real implementation at some parts of the system. This difference in scales can make it hard to relate the evaluations made created with simulation and emulation during the design and implementation phases and can results in a limited evaluation of the implementation, which may cause severe problems after deployment. |
693 | 693 | ||
694 | In this thesis, we build upon an existing emulator for P2P applications to push the scales offered by emulation towards the limits set by simulation. Our approach distributes and co-ordinates the emulation across many hosts. Large deployments are possible by deploying hundreds or thousands of peers on each host. | 694 | In this thesis, we build upon an existing emulator for P2P applications to push the scales offered by emulation towards the limits set by simulation. Our approach distributes and co-ordinates the emulation across many hosts. Large deployments are possible by deploying hundreds or thousands of peers on each host. |
@@ -764,9 +764,9 @@ In this paper we describe the problems that occur when debugging widely distribu | |||
764 | year = {2013}, | 764 | year = {2013}, |
765 | month = nov, | 765 | month = nov, |
766 | pages = {0--124}, | 766 | pages = {0--124}, |
767 | school = {Technische Universitaet Muenchen}, | 767 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
768 | type = {Master's}, | 768 | type = {Master's}, |
769 | address = {Garching bei Muenchen}, | 769 | address = {Garching bei M{\"u}nchen}, |
770 | abstract = {SPDY is a rather new protocol which is an alternative to HTTP. It was designed to address inefficiencies in the latter and thereby improve latency and reduce bandwidth consumption. | 770 | abstract = {SPDY is a rather new protocol which is an alternative to HTTP. It was designed to address inefficiencies in the latter and thereby improve latency and reduce bandwidth consumption. |
771 | 771 | ||
772 | This thesis presents the design and implementation of a setup for utilizing SPDY within the anonymizing Tor network for reducing latency and traffic in the latter. A C library implementing the SPDY server protocol is introduced together with an HTTP to SPDY and a SPDY to HTTP proxy which are the base for the presented design. | 772 | This thesis presents the design and implementation of a setup for utilizing SPDY within the anonymizing Tor network for reducing latency and traffic in the latter. A C library implementing the SPDY server protocol is introduced together with an HTTP to SPDY and a SPDY to HTTP proxy which are the base for the presented design. |
@@ -895,9 +895,9 @@ This thesis includes extensive measurement data highlighting the possible benefi | |||
895 | year = {2012}, | 895 | year = {2012}, |
896 | month = nov, | 896 | month = nov, |
897 | pages = {0--100}, | 897 | pages = {0--100}, |
898 | school = {Technische Universitaet Muenchen}, | 898 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
899 | type = {Masters}, | 899 | type = {Masters}, |
900 | address = {Garching bei Muenchen}, | 900 | address = {Garching bei M{\"u}nchen}, |
901 | abstract = {This thesis presents a novel approach for decentralized evaluation of regular expressions for capability discovery in DHT-based overlays. The system provides support for announcing capabilities expressed as regular expressions and discovering participants offering adequate capabilities. The idea behind our approach is to convert regular expressions into finite automatons and store the corresponding states and transitions in a DHT. We show how locally constructed DFA are merged in the DHT into an NFA without the knowledge of any NFA already present in the DHT and without the need for any central authority. Furthermore we present options of optimizing the DFA. There exist several possible applications for this general approach of decentralized regular expression evaluation. However, in this thesis we focus on the application of discovering users that are willing to provide network access using a specified protocol to a particular destination. We have implemented the system for our proposed approach and conducted a simulation. Moreover we present the results of an emulation of the implemented system in a cluster}, | 901 | abstract = {This thesis presents a novel approach for decentralized evaluation of regular expressions for capability discovery in DHT-based overlays. The system provides support for announcing capabilities expressed as regular expressions and discovering participants offering adequate capabilities. The idea behind our approach is to convert regular expressions into finite automatons and store the corresponding states and transitions in a DHT. We show how locally constructed DFA are merged in the DHT into an NFA without the knowledge of any NFA already present in the DHT and without the need for any central authority. Furthermore we present options of optimizing the DFA. There exist several possible applications for this general approach of decentralized regular expression evaluation. However, in this thesis we focus on the application of discovering users that are willing to provide network access using a specified protocol to a particular destination. We have implemented the system for our proposed approach and conducted a simulation. Moreover we present the results of an emulation of the implemented system in a cluster}, |
902 | www_section = {DFA, distributed hash table, GNUnet, NFA, regular expressions, search}, | 902 | www_section = {DFA, distributed hash table, GNUnet, NFA, regular expressions, search}, |
903 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/szengel2012ms.pdf}, | 903 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/szengel2012ms.pdf}, |
@@ -912,7 +912,7 @@ This thesis includes extensive measurement data highlighting the possible benefi | |||
912 | pages = {0--116}, | 912 | pages = {0--116}, |
913 | school = {TU Munich}, | 913 | school = {TU Munich}, |
914 | type = {Master's}, | 914 | type = {Master's}, |
915 | address = {Garching bei Muenchen}, | 915 | address = {Garching bei M{\"u}nchen}, |
916 | abstract = {This thesis presents the design and implementation of the GNU Alternative Domain System (GADS), a decentralized, secure name system providing memorable names for the Internet as an alternative to the Domain Name System (DNS). The system builds on ideas from Rivest's Simple Distributed Security Infrastructure (SDSI) to address a central issue with providing a decentralized mapping of secure identifiers to memorable names: providing a global, secure and memorable mapping is impossible without a trusted authority. SDSI offers an alternative by linking local name spaces; GADS uses the transitivity provided by the SDSI design to build a decentralized and censorship resistant name system without a trusted root based on secure delegation of authority. Additional details need to be considered in order to enable GADS to integrate smoothly with the World Wide Web. While following links on the Web matches following delegations in GADS, the existing HTTP-based infrastructure makes many assumptions about globally unique names; however, proxies can be used to enable legacy applications to function with GADS. This work presents the fundamental goals and ideas behind GADS, provides technical details on how GADS has been implemented and discusses deployment issues for using GADS with existing systems. We discuss how GADS and legacy DNS can interoperate during a transition period and what additional security advantages GADS offers over DNS with Security Extensions (DNSSEC). Finally, we present the results of a survey into surfing behavior, which suggests that the manual introduction of new direct links in GADS will be infrequent}, | 916 | abstract = {This thesis presents the design and implementation of the GNU Alternative Domain System (GADS), a decentralized, secure name system providing memorable names for the Internet as an alternative to the Domain Name System (DNS). The system builds on ideas from Rivest's Simple Distributed Security Infrastructure (SDSI) to address a central issue with providing a decentralized mapping of secure identifiers to memorable names: providing a global, secure and memorable mapping is impossible without a trusted authority. SDSI offers an alternative by linking local name spaces; GADS uses the transitivity provided by the SDSI design to build a decentralized and censorship resistant name system without a trusted root based on secure delegation of authority. Additional details need to be considered in order to enable GADS to integrate smoothly with the World Wide Web. While following links on the Web matches following delegations in GADS, the existing HTTP-based infrastructure makes many assumptions about globally unique names; however, proxies can be used to enable legacy applications to function with GADS. This work presents the fundamental goals and ideas behind GADS, provides technical details on how GADS has been implemented and discusses deployment issues for using GADS with existing systems. We discuss how GADS and legacy DNS can interoperate during a transition period and what additional security advantages GADS offers over DNS with Security Extensions (DNSSEC). Finally, we present the results of a survey into surfing behavior, which suggests that the manual introduction of new direct links in GADS will be infrequent}, |
917 | www_section = {censorship resistance, decentralized, DNS, GNU Name System, GNUnet}, | 917 | www_section = {censorship resistance, decentralized, DNS, GNU Name System, GNUnet}, |
918 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/schanzen2012msc.pdf}, | 918 | www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/schanzen2012msc.pdf}, |
@@ -943,8 +943,8 @@ Interestingly, the design of our mechanism is quite different from the tradition | |||
943 | title = {Efficient and Secure Decentralized Network Size Estimation}, | 943 | title = {Efficient and Secure Decentralized Network Size Estimation}, |
944 | year = {2012}, | 944 | year = {2012}, |
945 | month = may, | 945 | month = may, |
946 | institution = {Technische Universitaet Muenchen}, | 946 | institution = {Technische Universit{\"a}t M{\"u}nchen}, |
947 | address = {Garching bei Muenchen}, | 947 | address = {Garching bei M{\"u}nchen}, |
948 | abstract = {The size of a Peer-to-Peer (P2P) network is an important parameter for | 948 | abstract = {The size of a Peer-to-Peer (P2P) network is an important parameter for |
949 | performance tuning of P2P routing algorithms. This paper introduces | 949 | performance tuning of P2P routing algorithms. This paper introduces |
950 | and evaluates a new efficient method for participants in an | 950 | and evaluates a new efficient method for participants in an |
@@ -1117,9 +1117,9 @@ We also simplify the lower bounds on noise for counting queries in [11] and also | |||
1117 | year = {2012}, | 1117 | year = {2012}, |
1118 | month = jul, | 1118 | month = jul, |
1119 | pages = {0--78}, | 1119 | pages = {0--78}, |
1120 | school = {Technische Universitaet Muenchen}, | 1120 | school = {Technische Universit{\"a}t M{\"u}nchen}, |
1121 | type = {Masters}, | 1121 | type = {Masters}, |
1122 | address = {Garching bei Muenchen}, | 1122 | address = {Garching bei M{\"u}nchen}, |
1123 | abstract = {Debugging is tedious and time consuming work that, for certain types of bugs, can and should be automated. Debugging distributed systems is more complex due to time dependencies between interacting processes. Another related problem is duplicate bug reports in bug repositories. Finding bug duplicates is hard and wastes developers' time which may affect the development team's rate of bug fixes and new releases. | 1123 | abstract = {Debugging is tedious and time consuming work that, for certain types of bugs, can and should be automated. Debugging distributed systems is more complex due to time dependencies between interacting processes. Another related problem is duplicate bug reports in bug repositories. Finding bug duplicates is hard and wastes developers' time which may affect the development team's rate of bug fixes and new releases. |
1124 | In this master thesis we introduce Monkey, a new tool that provides a solution for automated classification, investigation and characterization of bugs, as well as a solution for comparing bug reports and avoiding duplicates. Our tool is particularly suitable for distributed systems due to its autonomy. We present Monkey's key design goals and architecture and give experimental results demonstrating the viability of our approach}, | 1124 | In this master thesis we introduce Monkey, a new tool that provides a solution for automated classification, investigation and characterization of bugs, as well as a solution for comparing bug reports and avoiding duplicates. Our tool is particularly suitable for distributed systems due to its autonomy. We present Monkey's key design goals and architecture and give experimental results demonstrating the viability of our approach}, |
1125 | www_section = {automation, debugging, distributed systems}, | 1125 | www_section = {automation, debugging, distributed systems}, |