Advertisement

On Shouting “Fire!”: Regulating Decoupled Communication in Distributed Systems

  • Takahiro Murata
  • Naftaly H. Minsky
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2672)

Abstract

Decoupled communication, which requires no direct association between the producers of information and its consumers — as under the publish/subscribe (P/S) middleware — is often essential for the integration of distributed and heterogeneous applications. But the indefinite, and potentially global, reach of decoupled communication — the very reason for its power — has a dark side, which may complicate the system using it, making it less predictable, more brittle, and less safe. Just think about the effect of shouting “fire” in a packed theatre, particularly, but not only, if it is a false alarm. p ]It is our thesis that the inherent drawbacks of decoupled communication can be tamed by decentralized regulation of its use. We show how such regulation can be carried out scalably by means of a distributed control mechanism called Law-Governed Interaction (LGI), and a middleware called Moses that implements this mechanism. Along the way, we illustrate the importance of such regulation, and its effectiveness, by considering the treatment of alarms in a large hospital.

Keywords

Home Agent Facility Manager Primitive Operation Processing Thread Packed Theatre 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    X. Ao, N. Minsky, T. Nguyen, and V. Ungureanu. Law-governed communities over the internet. In Proc. of Fourth International Conference on Coordination Models and Languages; Limassol, Cyprus; LNCS 1906, pages 133–147, September 2000. http://www.cs.rutgers.edu/~minsky/pubs.html).Google Scholar
  2. 2.
    X. Ao, N. Minsky, and V. Ungureanu. Formal treatment of certificate revocation under communal access control. In Proc. of the 2001 IEEE Symposium on Security and Privacy, May 2001, Oakland California, May 2001. (available from http://www.cs.rutgers.edu/~minsky/pubs.html).
  3. 3.
    A. Campailla, S. Chaki, E. Clarke, S. Jha, and H. Veith. Efficient filtering in publish-subscirbe systems using binary decision diagrams. In Proc. of The 23rd Intn’l Conf. on Soft. Eng. (ICSE), pages 443–452, May 2001.Google Scholar
  4. 4.
    N. Carriero and D. Gelernter. Linda in context. Communications of the ACM, 32(4):444–458, April 1989.CrossRefGoogle Scholar
  5. 5.
    P.Th. Eugster, P. Felber, R. Guerraoui, and A.-M. Kermarrec. The many faces of publish/subscribe. Technical report, EPFL, January 2001. DSC ID: 2000104.Google Scholar
  6. 6.
    D. Garlan and D. Notkin. Formalizing dsign spaces: Implicit invocation mechanisms. In Proc. of VDM’ 91: 4th Intn’l Sympo. of VDM Europe on Foraml Software Development Methods; LNCS 551, pages 31–44, Noordwijkerhout, The Netherlands, October 1991. Springer-Verlag.Google Scholar
  7. 7.
    M. Hapner et al. Java Message Service. Sun Microsystems Inc., August 2001. Version 1.0.2b, website: http://java.sun.com/products/jms/docs.html.
  8. 8.
    IBM Corp. Gryphon-The system. website: http://www.research.ibm.com/gryphon/Gryphon/gryphon.html.
  9. 9.
    G. Karjoth. The authorization service of tivoli policy director. In Proc. of the 17th Annual Computer Security Applications Conf. (ACSAC 2001), December 2001.Google Scholar
  10. 10.
    Z. Miklós. Towards an access control mechanism for wide-are publish/subscribe systems. In Proc. of Intn’l Workshop on Distributed Event-Based Systems (DEBS’02), July 2002.Google Scholar
  11. 11.
    N.H. Minsky. The imposition of protocols over open distributed systems. IEEE Transactions on Software Engineering, February 1991.Google Scholar
  12. 12.
    N.H. Minsky, Y.M. Minsky, and V. Ungureanu. Safe tuplespace-based coordination in multiagent systems. Journal of Applied Artificial Intelligence (AAI), 15(1):11–33, January 2001. (available from http://www.cs.rutgers.edu/~minsky/pubs.html).CrossRefGoogle Scholar
  13. 13.
    N.H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. TOSEM, ACM Transactions on Software Engineering and Methodology, 9(3):273–305, July 2000. (available from http://www.cs.rutgers.edu/~minsky/pubs.html).CrossRefGoogle Scholar
  14. 14.
    D.S. Rosenblum and A.L. Wolf. A design framework for internet-scale event observation and notification. In Proc. of the Sixth European Soft. Eng. Conf.; Zurich, Switzerland; LNCS 1301, pages 344–360. Springer-Verlag, September 1997.Google Scholar
  15. 15.
    B. Schneier. Applied Cryptography. John Wiley and Sons, 1996.Google Scholar
  16. 16.
    C. Serban, X. Ao, and N.H. Minsky. Establishing enterprise communities. In Proc. of the 5th IEEE Intn’l Enterprise Distributed Object Computing Conf. (EDOC 2001), Seattle, Washington, September 2001. (available from http://www.cs.rutgers.edu/~minsky/pubs.html).
  17. 17.
    C. Serban and N.H. Minsky. Using java as a language for writing lgi-laws. Technical report, Rutgers University, July 2002.Google Scholar
  18. 18.
    C. Wang, A. Carzaniga, D. Evans, and A.L. Wolf. Security issues and requirements for Internet-scale publish-subscribe systems. In Proc. of the 35th Annual Hawaii Intn’l Conf. on System Sciences, Hawaii, January 2002.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Takahiro Murata
    • 1
  • Naftaly H. Minsky
    • 1
  1. 1.Dept. of Computer ScienceRutgers UniversityPiscatawayUSA

Personalised recommendations