Skip to main content

Showing 1–15 of 15 results for author: Roussopoulos, M

Searching in archive cs. Search in all archives.
.
  1. An Alternative Paradigm for Develo** and Pricing Storage on Smart Contract Platforms

    Authors: Christos Patsonakis, Mema Roussopoulos

    Abstract: Smart contract platforms facilitate the development of important and diverse distributed applications in a simple manner. This simplicity stems from the inherent utility of employing the state of smart contracts to store, query and verify the validity of application data. In Ethereum, data storage incurs an underpriced, non-recurring, predefined fee. Furthermore, as there is no incentive for freei… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

    Comments: 6 pages, 2 figures, DAPPCON 2019

    Journal ref: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)

  2. On the Practicality of Smart Contract PKI

    Authors: Christos Patsonakis, Katerina Samari, Aggelos Kiayias, Mema Roussopoulos

    Abstract: Public key infrastructures (PKIs) are one of the main building blocks for securing communications over the Internet. Currently, PKIs are under the control of centralized authorities, which is problematic as evidenced by numerous incidents where they have been compromised. The distributed, fault tolerant log of transactions provided by blockchains and more recently, smart contract platforms, consti… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

    Comments: 10 pages, 3 figures, 2 tables, DAPPCON 2019

    Journal ref: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)

  3. arXiv:1608.00849  [pdf, ps, other

    cs.CR cs.DC

    Distributed, End-to-end Verifiable, and Privacy-Preserving Internet Voting Systems

    Authors: Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos

    Abstract: E-voting systems are a powerful technology for improving democracy. Unfortunately, prior voting systems have single points-of-failure, which may compromise availability, privacy, or integrity of the election results. We present the design, implementation, security analysis, and evaluation of the D-DEMOS suite of distributed, privacy-preserving, and end-to-end verifiable e-voting systems. We pres… ▽ More

    Submitted 2 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1507.06812

  4. arXiv:1507.06812  [pdf, ps, other

    cs.CR cs.DC

    D-DEMOS: A distributed, end-to-end verifiable, internet voting system

    Authors: Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos

    Abstract: E-voting systems have emerged as a powerful technology for improving democracy by reducing election cost, increasing voter participation, and even allowing voters to directly verify the entire election procedure. Prior internet voting systems have single points of failure, which may result in the compromise of availability, voter secrecy, or integrity of the election results. In this paper, we pre… ▽ More

    Submitted 18 December, 2015; v1 submitted 24 July, 2015; originally announced July 2015.

    Comments: 17 pages, 5 figures

  5. arXiv:1410.7256  [pdf, other

    cs.DC

    Interactive Consistency in practical, mostly-asynchronous systems

    Authors: Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Nikos Chondros, Mema Roussopoulos

    Abstract: Interactive consistency is the problem in which n nodes, where up to t may be byzantine, each with its own private value, run an algorithm that allows all non-faulty nodes to infer the values of each other node. This problem is relevant to critical applications that rely on the combination of the opinions of multiple peers to provide a service. Examples include monitoring a content source to preve… ▽ More

    Submitted 27 July, 2015; v1 submitted 27 October, 2014; originally announced October 2014.

    Comments: 13 pages, 10 figures

  6. arXiv:1403.1180  [pdf, ps, other

    cs.DB cs.DC cs.DL

    A distributed Integrity Catalog for digital repositories

    Authors: Nikos Chondros, Mema Roussopoulos

    Abstract: Digital repositories, either digital preservation systems or archival systems, periodically check the integrity of stored objects to assure users of their correctness. To do so, prior solutions calculate integrity metadata and require the repository to store it alongside the actual data objects. This integrity metadata is essential for regularly verifying the correctness of the stored data objects… ▽ More

    Submitted 25 September, 2014; v1 submitted 4 February, 2014; originally announced March 2014.

  7. arXiv:1310.6119  [pdf, other

    cs.SI physics.soc-ph

    Asynchronous Rumour Spreading in Social and Signed Topologies

    Authors: Christos Patsonakis, Mema Roussopoulos

    Abstract: In this paper, we present an experimental analysis of the asynchronous push & pull rumour spreading protocol. This protocol is, to date, the best-performing rumour spreading protocol for simple, scalable, and robust information dissemination in distributed systems. We analyse the effect that multiple parameters have on the protocol's performance, such as using memory to avoid contacting the same n… ▽ More

    Submitted 15 January, 2015; v1 submitted 23 October, 2013; originally announced October 2013.

    Comments: 10 pages, 4 figures, 5 tables

  8. arXiv:1110.4854  [pdf, ps, other

    cs.DC

    On the Practicality of `Practical' Byzantine Fault Tolerance

    Authors: Nikos Chondros, Konstantinos Kokordelis, Mema Roussopoulos

    Abstract: Byzantine Fault Tolerant (BFT) systems are considered by the systems research community to be state of the art with regards to providing reliability in distributed systems. BFT systems provide safety and liveness guarantees with reasonable assumptions, amongst a set of nodes where at most f nodes display arbitrarily incorrect behaviors, known as Byzantine faults. Despite this, BFT systems are stil… ▽ More

    Submitted 21 October, 2011; originally announced October 2011.

  9. arXiv:cs/0508130  [pdf, ps, other

    cs.DL cs.DB cs.OS

    A Fresh Look at the Reliability of Long-term Digital Storage

    Authors: Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, TJ Giuli, Prashanth Bungale

    Abstract: Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an e… ▽ More

    Submitted 30 August, 2005; originally announced August 2005.

  10. arXiv:cs/0411078  [pdf, ps, other

    cs.DL

    Notes On The Design Of An Internet Adversary

    Authors: David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, T. J. Giuli, Mary Baker

    Abstract: The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary bas… ▽ More

    Submitted 21 November, 2004; originally announced November 2004.

    ACM Class: H.3.7

    Journal ref: Second Annual Adaptive and Resilient Computing Security Workshop, Santa Fe, 2003

  11. arXiv:cs/0405111  [pdf, ps, other

    cs.CR

    Attrition Defenses for a Peer-to-Peer Digital Preservation System

    Authors: T. J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos

    Abstract: In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even from powerful adversaries are less effective than… ▽ More

    Submitted 27 November, 2004; v1 submitted 28 May, 2004; originally announced May 2004.

    Comments: 14 pages, 8 figures. version 2: Reworked the paper according to reviews. Expanded the evaluation section with experiments with more AUs

    ACM Class: C.2.4; D.4.6

  12. arXiv:cs/0311017  [pdf, ps, other

    cs.NI cs.AR

    2 P2P or Not 2 P2P?

    Authors: Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, TJ Giuli, Petros Maniatis, Jeff Mogul

    Abstract: In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.

    Submitted 14 November, 2003; originally announced November 2003.

    Comments: 6 pages, 1 figure

    ACM Class: C.2.4

  13. arXiv:cs/0303026  [pdf, ps, other

    cs.DC cs.DL

    Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS

    Authors: Petros Maniatis, Mema Roussopoulos, TJ Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi

    Abstract: The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and… ▽ More

    Submitted 17 October, 2003; v1 submitted 25 March, 2003; originally announced March 2003.

    Comments: 25 Pages, 10 figures. Extended version of conference paper

    ACM Class: C.2.4; H.3.7; D.4.5

  14. arXiv:cs/0209023  [pdf, ps, other

    cs.NI cs.DC

    Practical Load Balancing for Content Requests in Peer-to-Peer Networks

    Authors: Mema Roussopoulos, Mary Baker

    Abstract: This paper studies the problem of load-balancing the demand for content in a peer-to-peer network across heterogeneous peer nodes that hold replicas of the content. Previous decentralized load balancing techniques in distributed systems base their decisions on periodic updates containing information about load or available capacity observed at the serving entities. We show that these techniques… ▽ More

    Submitted 20 September, 2002; originally announced September 2002.

    Comments: 23 pages, 38 figures

    ACM Class: C.2.4

  15. arXiv:cs/0202008  [pdf, ps, other

    cs.NI

    CUP: Controlled Update Propagation in Peer-to-Peer Networks

    Authors: Mema Roussopoulos, Mary Baker

    Abstract: Recently the problem of indexing and locating content in peer-to-peer networks has received much attention. Previous work suggests caching index entries at intermediate nodes that lie on the paths taken by search queries, but until now there has been little focus on how to maintain these intermediate caches. This paper proposes CUP, a new comprehensive architecture for Controlled Update Propagat… ▽ More

    Submitted 7 February, 2002; originally announced February 2002.

    Comments: 15 pages, 6 figures

    ACM Class: C.2.4