Abstract
A truly personal machine, called a private machine and implemented as a Personal Digital Assistant (PDA), is fundamentally different from traditional machines. It is personal and private in an unprecedented manner, and its modus operandi is such that network and power failures will not be rare. Designing distributed systems where PDAs are treated as “first class citizens” is a challenge.
Furthermore, private assets (electronic money, keys for authentication and opening doors) will be stored in PDAs. Ownership and control of these assets and the media that store and communicate them should remain with the user. This must be reflected in the design of systems for private computing.
We introduce the “open-ended argument” to describe the design strategy we used for designing a system that is designed to reveal information to the user (as opposed to hide it). We argue and show that when systems are designed this way, the user (a human) is better able to control the system and his personal data, as he can make better decisions than the system itself based on qualitative assessment of the provided information. The system we have designed and implemented under this design guidelines is presented and discussed.
Acknowledgments
Frode Fjeld, Åge Kvalnes and the anonymous referees gave us feedback that has improved the presentation. Arne Helme participated in the work on offline delegation. Working in the “PASTA laboratory” is very stimulating.
Funded by the GDD project of the Research Council of Norway (project number 112577/431).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Baggio. System support for transparency and network-aware adaptation in mobile environments. In ACM Symposium on Applied Computing special track on Mobile Computing Systems and Applications, Atlanta, Georgia, USA, February 1998. Also available as a research report: INRIA Research Report 3408, April 1998.
E. Brewer, R. H. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, S. Gribble, G. Hodes, T. Nguyen, V. Padmanabhan, M. Stemm, S. Seshan, and T. Henderson. A network architecture for heterogeneous mobile computing. IEEE Personal Communications Magazine, 5(5):8–24, October 1998.
J. B. Dennis and E. C. van Horn. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155, March 1966.
D. K. Gifford. Weighted voting for replicated data. In Proceedings of 7th SOSP, pages 150-62. ACM Press, 1979.
A. Goscinski. Distributed Operating Systems, The Logical Design. Addison-Wesley, 1991.
A. Helme and T. Stabell-Kul∅. Offline delegation. In 8th Usenix Security Symposium, 1999. Accepted for publication.
A. D. Joseph, J. A. Tauber, and M. Frans Kaashoek. Mobile computing with the Rover toolkit. IEEE Transactions on Computers: Special issue on Mobile Computing, pages 337–352, March 1997.
J. J. Kistler. Disconnected operations in a distributed file system, volume 1002 of Lecture Notes in Computer Science. Springer Verlag, 1996.
J. J. Kistler and M. Satyanarayanan. Disconnected operation in the Coda file system. Transactions on Computer Systems, 10(1):3–25, February 1992.
B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437–443, Princeton University, March 1971. Reprinted in Operating Systems Review, 8, 1, January 1974, pp. 18-24.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, November 1992.
G. Moxnes. Design og implementasjon av replikering file repository (in Norwegian). Masters thesis, Department of Computer Science, University of Troms∅, Norway, April 1997.
Brian D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R. Walker. Agile application-aware adaption for mobility. ACM SIGOPS Operating Systems Review, 31(5):276–287, Dec. 1997. in: SIGOPS’ 97. Proceedings of the sixteenth ACM symposium on Operating systems principles, pages 264-275.
D. P. Reed, J. H. Saltzer, and D. D. Clark. Active networking and end-to-end arguments. IEEE Network, 12(3):69–71, May 1998.
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277–288, November 1984.
R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon. Design and implementation of the Sun Network Filesystem. In Summer conference proceedings, Portland 1985: June 11-14, 1985, Portland, Oregon USA, pages 119–130. USENIX, Summer 1985.
T. Stabell-Kul∅. File repository transfer protocol (frtp). Technical report, Department of Computer Science, University of Troms∅, Norway, February 1995.
J. G. Steiner, B. G Neumann, and J. I. Schiller. Kerberos: An Authentication System for Open Network Systems. In Proc. of the Winter 1988 Usenix Conference, pages 191–201, February 1988.
A. S. Tanenbaum, R. van Renesse, H. van Staveren, G. J. Sharp, S. J. Mullender, J. Jansen, and G. van Rossum. Experiences with the Amoeba distributed operating system. Comunication of the ACM, 33(12):46–63, December 1990.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stabell-Kul∅, T., Dillema, F., Fallmyr, T. (1999). The Open-End Argument for Private Computing. In: Gellersen, HW. (eds) Handheld and Ubiquitous Computing. HUC 1999. Lecture Notes in Computer Science, vol 1707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48157-5_13
Download citation
DOI: https://doi.org/10.1007/3-540-48157-5_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66550-2
Online ISBN: 978-3-540-48157-7
eBook Packages: Springer Book Archive