Foreword |
|
9 | (4) |
|
|
13 | (6) |
|
|
|
|
|
FIRST PART LARGE SCALE PEER-TO-PEER DISTRIBUTED SYSTEMS |
|
|
19 | (86) |
|
Chapter 2 Introduction to Large-Scale Peer-to-Peer Distributed Systems |
|
|
21 | (12) |
|
|
2.1 "Large-Scale" distributed systems? |
|
|
21 | (1) |
|
2.2 Consequences of "large-scale" |
|
|
22 | (1) |
|
2.3 Some large-scale distributed systems |
|
|
23 | (3) |
|
2.4 Architectures of large scale distributed systems |
|
|
26 | (4) |
|
|
30 | (1) |
|
|
31 | (2) |
|
Chapter 3 Design Principles of Large-Scale Distributed System |
|
|
33 | (26) |
|
|
|
3.1 Introduction to peer-to-peer systems |
|
|
33 | (1) |
|
3.2 The peer-to-peer paradigms |
|
|
34 | (7) |
|
3.3 Services on structured overlays |
|
|
41 | (2) |
|
3.4 Building trust in P2P systems |
|
|
43 | (9) |
|
|
52 | (1) |
|
|
53 | (6) |
|
Chapter 4 Peer-to-Peer Storage |
|
|
59 | (22) |
|
|
|
|
|
59 | (1) |
|
|
60 | (6) |
|
|
66 | (13) |
|
|
79 | (1) |
|
|
79 | (2) |
|
Chapter 5 Large-Scale Peer-to-Peer Game Applications |
|
|
81 | (24) |
|
|
|
|
81 | (2) |
|
5.2 Large-scale game applications: model and specific requirements |
|
|
83 | (7) |
|
5.3 Overview of peer-to-peer overlays for large-scale game applications |
|
|
90 | (3) |
|
5.4 Overlays for FPS games |
|
|
93 | (2) |
|
5.5 Overlays for online life-simulation games |
|
|
95 | (5) |
|
|
100 | (1) |
|
|
101 | (4) |
|
SECOND PART DISTRIBUTED, EMBEDDED AND REAL-TIME SYSTEMS |
|
|
105 | (124) |
|
Chapter 6 Introduction to Distributed Embedded and Real-time Systems |
|
|
107 | (10) |
|
|
6.1 Distributed real-time embedded systems |
|
|
108 | (1) |
|
6.2 Safety critical systems as examples of DRE systems |
|
|
109 | (3) |
|
6.3 Design process of DRE systems |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
115 | (2) |
|
Chapter 7 Scheduling in Distributed Real-Time Systems |
|
|
117 | (42) |
|
|
|
|
|
117 | (1) |
|
7.2 Generalities about real-time systems |
|
|
118 | (4) |
|
|
122 | (4) |
|
|
126 | (16) |
|
|
142 | (7) |
|
|
149 | (5) |
|
|
154 | (1) |
|
|
155 | (4) |
|
Chapter 8 Software Engineering for Adaptative Embedded Systems |
|
|
159 | (32) |
|
|
|
159 | (1) |
|
8.2 Adaptation, an additional complexity factor |
|
|
160 | (3) |
|
8.3 Theoretical aspects of adaptation management |
|
|
163 | (8) |
|
8.4 Technical solutions for the design of adaptative embedded systems |
|
|
171 | (5) |
|
8.5 An example of adaptative system from the robotic domain |
|
|
176 | (1) |
|
8.6 Applying MDE techniques to the design of the robotic use-case |
|
|
177 | (7) |
|
8.7 Exploitation of the models |
|
|
184 | (4) |
|
|
188 | (1) |
|
|
189 | (2) |
|
Chapter 9 The Design of Aerospace Systems |
|
|
191 | (38) |
|
|
|
|
|
191 | (2) |
|
9.2 Flight software typical architecture |
|
|
193 | (2) |
|
9.3 Traditional development methods and their limits |
|
|
195 | (2) |
|
9.4 Modeling a software system using TASTE: philosophy |
|
|
197 | (2) |
|
|
199 | (1) |
|
9.6 What TASTE specifically proposes |
|
|
200 | (1) |
|
9.7 Modeling process and tools |
|
|
201 | (7) |
|
|
208 | (1) |
|
9.9 Model transformations |
|
|
209 | (4) |
|
|
213 | (2) |
|
9.11 Illustrating our process by designing heterogeneous systems |
|
|
215 | (9) |
|
9.12 First user feedback and TASTE future |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
226 | (3) |
|
THIRD PART SECURITY IN DISTRIBUTED SYSTEMS |
|
|
229 | (102) |
|
Chapter 10 Introduction to Security Issues in Distributed Systems |
|
|
231 | (6) |
|
|
|
231 | (2) |
|
10.2 Secure data exchange |
|
|
233 | (1) |
|
10.3 Security in specific distributed systems |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (2) |
|
Chapter 11 Practical Security in Distributed Systems |
|
|
237 | (64) |
|
|
|
|
|
|
|
237 | (12) |
|
|
249 | (3) |
|
|
252 | (9) |
|
11.4 Availability and fault tolerance |
|
|
261 | (14) |
|
11.5 Ensuring resource security |
|
|
275 | (8) |
|
11.6 Result checking in distributed computations |
|
|
283 | (8) |
|
|
291 | (1) |
|
|
292 | (9) |
|
Chapter 12 Enforcing Security with Cryptography |
|
|
301 | (30) |
|
|
|
|
301 | (2) |
|
12.2 Cryptography: from a general perspective |
|
|
303 | (5) |
|
12.3 Symmetric encryption schemes |
|
|
308 | (16) |
|
12.4 Prime numbers and public key cryptography |
|
|
324 | (4) |
|
|
328 | (1) |
|
|
329 | (2) |
List of Authors |
|
331 | (2) |
Index |
|
333 | |