PEPITO - PEer-to-Peer: Implementation and
TheOry
PEPITO is a project funded by
EU IST FET Global Computing (GC), running from 1 January 2002 for
three years. Here is the main project page.
Workpackage 1: Formal Models
This workpackage will devise formal models for peer-to-peer group
collaboration (P2P-calculus), transactions, versioning and
modularity.
From the original technical annex we have these major items:
- Transactions and the semantics of failure
(EPFL, UCAM, UCL)
- Versioning and modularity
(UCAM)
- Models of peer-to-peer group collaboration
(EPFL, INRIA, UCAM, UCL)
Activity
Activity in this workpackage is described in the following documents.
- Initial activities, as of 2002/04/22 (html).
- D1.7 First progress report on formal models (month 12)
(html)
(ps).
See also the attached papers below.
- D1.1 Required foundations for peer-to-peer systems (month 18)
(pdf)
- D1.3 Axiomatisation of Transactions (month 18)
(pdf)
- D1.8 Second progress report on formal models (month 24)
(pdf)
(html).
See also the
attached papers.
The revised technical annex integrates the Versioning and Modularity
work into a joint task (with INRIA) of WP3; see
the month-24 overview in D3.10 and
the attached
papers thereof.
Attached papers for D1.7
- [CBOG02]
-
Vincent Cremet, Andrew Black, Martin Odersky, and Rachid Guerraoui.
Axiomatization of transactions.
http://lampwww.epfl.ch/~cremet/transactions.html.
Paper draft, 2002.
- [NSW02]
-
Michael Norrish, Peter Sewell, and Keith Wansbrough.
Rigour is good for you, and feasible: reflections on formal
treatments of C and UDP sockets.
In Proceedings of 10th ACM SIGOPS European Workshop
(Saint-Emilion), pages 49--53, September 2002.
http://www.cl.cam.ac.uk/users/pes20/Netsem/sigops-ew2002.ps.
- [SD02]
-
Andrei Serjantov and George Danezis.
Towards an information theoretic metric for anonymity.
In Paul Syverson and Roger Dingledine, editors, Privacy
Enhancing Technologies, LNCS 2482, San Francisco, CA, April 2002.
http://www.cl.cam.ac.uk/~aas23/papers_aas/set.ps.
- [SDS02]
-
Andrei Serjantov, Roger Dingledine, and Paul Syverson.
From a trickle to a flood: Active attacks on several mix types.
In Fabien Petitcolas, editor, 5th Workshop on Information
Hiding, LNCS 2578, October 2002.
http://www.cl.cam.ac.uk/~aas23/taxonomy.pdf.
- [Ser02]
-
Andrei Serjantov.
Anonymizing censorship resistant systems.
In A. Rowstron P. Druschel, F. Kaashoek, editor, International
Workshop on Peer to Peer Systems, LNCS 2429, Boston, MA, March 2002.
http://www.cl.cam.ac.uk/~aas23/papers_aas/Anon_p2p2.ps.
- [SN03]
-
Andrei Serjantov and Richard Newman.
On the anonymity of timed pool mixes.
In Working Group 11.4 -- Privacy and Anonymity Issues in
Networked and Distributed Systems, Athens, Greece, May 2003.
To appear.
- [WNSS02]
-
Keith Wansbrough, Michael Norrish, Peter Sewell, and Andrei Serjantov.
Timing UDP: mechanized semantics for sockets, threads and failures.
In Proceedings of ESOP 2002: European Symposium on Programming
(Grenoble) LNCS 2305, pages 278--294, April 2002.
http://www.cl.cam.ac.uk/users/pes20/Netsem/timing-udp-a4.ps.
Peter Sewell
[Validate this page.]