Skip to main content

Showing 1–5 of 5 results for author: Zave, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.12861  [pdf, other

    cs.NI

    The Remaining Improbable: Toward Verifiable Network Services

    Authors: Pamela Zave, Jennifer Rexford, John Sonchack

    Abstract: The trustworthiness of modern networked services is too important to leave to chance. We need to design these services with specific properties in mind, and verify that the properties hold. In this paper, we argue that a compositional network architecture, based on a notion of layering where each layer is its own complete network customized for a specific purpose, is the only plausible approach to… ▽ More

    Submitted 27 September, 2020; originally announced September 2020.

    Comments: 6 pages with 4 figures, plus references. This paper has been reviewed extensively as a conference submission. Although some reviewers have found it cryptic due to its length (small) and scope (large), we are satisfied that it contains no factual errors. We welcome your questions!

  2. arXiv:1912.13371  [pdf, other

    cs.NI

    Patterns and Interactions in Network Security

    Authors: Pamela Zave, Jennifer Rexford

    Abstract: Networks play a central role in cyber-security: networks deliver security attacks, suffer from them, defend against them, and sometimes even cause them. This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not. To achieve this goal, we derive our focus and organization from two persp… ▽ More

    Submitted 6 June, 2020; v1 submitted 31 December, 2019; originally announced December 2019.

    Comments: 63 pages, 28 figures, 56 references

  3. Reasoning about identifier spaces: How to make Chord correct

    Authors: Pamela Zave

    Abstract: The Chord distributed hash table (DHT) is well-known and often used to implement peer-to-peer systems. Chord peers find other peers, and access their data, through a ring-shaped pointer structure in a large identifier space. Despite claims of proven correctness, i.e., eventual reachability, previous work has shown that the Chord ring-maintenance protocol is not correct under its original operating… ▽ More

    Submitted 25 July, 2019; v1 submitted 4 October, 2016; originally announced October 2016.

    Comments: 14 pages including references; 6 figures. arXiv admin note: text overlap with arXiv:1502.06461

    Journal ref: ACM/IEEE Transactions on Software Engineering, December 2017

  4. arXiv:1510.06714  [pdf, other

    cs.HC cs.CY

    Toward user-centric feature composition for the Internet of Things

    Authors: Pamela Zave, Eric Cheung, Svetlana Yarosh

    Abstract: Many user studies of home automation, as the most familiar representative of the Internet of Things, have shown the difficulty of developing technology that users understand and like. It helps to state requirements as largely-independent features, but features are not truly independent, so this incurs the cost of managing and explaining feature interactions. We propose to compose features at runti… ▽ More

    Submitted 22 October, 2015; originally announced October 2015.

    Comments: 11 pages, 3 figures

  5. arXiv:1502.06461  [pdf, other

    cs.DC

    How to Make Chord Correct

    Authors: Pamela Zave

    Abstract: The Chord distributed hash table (DHT) is well-known and frequently used to implement peer-to-peer systems. Chord peers find other peers, and access their data, through a ring-shaped pointer structure in a large identifier space. Despite claims of proven correctness, i.e., eventual reachability, previous work has shown that the Chord ring-maintenance protocol is not correct under its original oper… ▽ More

    Submitted 6 October, 2015; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: 5 figures; 11 two-column pages including references and appendix