Term Paper Undergraduate 870 words Human Written

Distribution Systems With a Concentration

Last reviewed: ~4 min read
80% visible
Read full paper →
Paper Overview

¶ … Distribution Systems with a Concentration on Cyber Foraging Cyber foraging and the quantification of trust in context-aware Web Applications: A Performance Assessment of Caching Trust vs. Hoarding Content Description The use of cyber foraging as a mechanism for enabling Internet-aware mobile devices of all types to interconnect with data...

Writing Guide
How to Write a Literature Review with Examples

Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 870 words · 80% shown · Sign up to read all

¶ … Distribution Systems with a Concentration on Cyber Foraging Cyber foraging and the quantification of trust in context-aware Web Applications: A Performance Assessment of Caching Trust vs. Hoarding Content Description The use of cyber foraging as a mechanism for enabling Internet-aware mobile devices of all types to interconnect with data staging servers shows significant potential for creating composite applications in real time, in addition to updating content taxonomies defined by mobile device users. Content taxonomies could potentially include social networking, consumer-generated media feeds including blogs, and news feeds enabled through RSS.

The definition and fine-tuning of content taxonomies on mobile devices is in its nascent stages today yet growing rapidly due to the sophistication of mobile devices; however a corresponding operating architecture with greater breadth and agility is needed. Caching trust, or the ability to sufficiently cache knowledge vs. hoarding content is a fundamental design decision in this architecture, and the design dichotomy addressed in these suggested research topics. Source(s) M. Satyanarayanan, Caching Trust Rather Than Content. M. Satyanarayanan. School of Computer Science, Carnegie Mellon University, Operating Systems Review.

Volume 34, No. 4, October 2000 The author of this paper presents the concept of caching as it has typically applied to the performance of computing systems, mentioning the concept of how this concept decreases latency and makes network failures transparent at the user level of networks.

The author contends that in mobile-based environments that would have the ability to deliver composite application components, entire applications and a wide variety of content-based applets, RSS and real-time newsfeeds through cyber foraging-based delivery mechanisms with data staging servers there is the fundamental decision of whether to hoard or cache content, and further, the author introduces the concept of caching trust. In this case, it is the assumption that all data of potential interest can be hoarded on the mobile client [1, 2, 4].

In other words, such clients have to be prepared to cope with cache misses during normal use. If they are able to cache trust, then any untrusted site in the fixed infrastructure can be used to stage data for servicing cache misses -- one does not have to go back to a distant server, nor does one have to compromise security. (p.

1)." Satyanarayanan goes on to mention the concepts of privacy being protected through the use of per-file private encryption keys to protect content on data staging servers and the use of a digital fingerprint to authenticate the content for use on the remote server. Satyanarayanan defines the security method as follows: It is simple to extend this idea to privacy. In addition to a fingerprint, the client also hoards a per-file private encryption key. The server encrypts each file before staging it on the surrogate.

To handle a cache miss at the remote site, the client fetches the data from the surrogate, decrypts it, verifies its fingerprint and then uses the data. The volume of cached keys can be reduced by using a single private encryption key for all files, at the price of total exposure if that key is broken.

(p.2)." The author concludes the article with mention of the Aura Project at Carnegie Mellon, an initiative which is aimed at defined distraction-free, ubiquitous computing and support for nomadic access using the Coda File System, which has recently been updated to support efficient update propagation over low-bandwidth networks [3]. Aura is a commonly referenced concept in much of the cyber foraging literature, and supports the concept of increasingly complex content taxonomies being synchronized with applications and data sources through the use of data staging servers. Rajesh Balan, Jason Flinn, M.

Satyanarayanan, Shafeeq Sinnamohideen and Hen-I Yang. The Case for Cyber Foraging. School of Computer Science. Carnegie Mellon University Publication. Carnegie Mellon University and Intel Research Pittsburgh definitive statement of the topic, the authors are experts in cyber foraging from Carnegie Mellon and the Intel Research Center in Pittsburgh, PA and include in this paper an analysis of the data staging architecture, critical design criteria, usage scenario and research challenges, usage scenarios in remote execution scenarios, a definition of the Chroma concept which pervades cyber.

174 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Cite This Paper
"Distribution Systems With A Concentration" (2007, December 20) Retrieved April 19, 2026, from
https://www.paperdue.com/essay/distribution-systems-with-a-concentration-33130

Always verify citation format against your institution's current style guide.

80% of this paper shown 174 words remaining