The Coarse-Grained Computing P2P Algorithm Based on SPKI

  • Yong Ma
  • Yumin Tian
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4222)


Distributed components, such as CORBA and COM+, implement the two-way invocation between the client and server using RPC in the distributed network. RPC requires that server must be certain and online all the time, which will endow the server with heavy burden and the system with single dependence on the server. The task certification and result certification, based on SPKI, are proposed to transform the RPC to Request/Response of XML-formed Certification. DHT is used to store and look up the certificates, which enable MR2CG (the Method of Coarse-Grained P2P Computing Based on XML Request/Response) to get rid of the limitation of the server and support the different kinds of Coarse-grained P2P computing.


Allot Task Distribute Hash Table Result Certificate Task Partition Lookup Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sun Microsystems.: Remote Procedure Call Protocol Specification RFC 1057 (1988)Google Scholar
  2. 2.
    Liu, J., Zhong, W., Jiao, L.: A multiagent evolutionary algorithm for constraint satisfaction problems. IEEE Trans. Syst., Man, and Cybern. B. 36(1), 54–73 (2006)CrossRefGoogle Scholar
  3. 3.
    Zhong, W., Liu, J., Xue, M., Jiao, L.: A multiagent genetic algorithm for global numerical optimization. IEEE Trans. Syst., Man, and Cybern. B. 34(2), 1128–1141 (2004)CrossRefGoogle Scholar
  4. 4.
    OMG. CORBAservices: Common Object Services Specification (1999) Google Scholar
  5. 5.
    MICROSOFT. DCOM: Distributed Component Object Model Protocol – DCOM/1.0 (1996) Google Scholar
  6. 6.
    Sullivan, W.T., Werthimer, D., Bowyer, S., Cobb, J., Gedye, D., Anderson, D.: A new major SETI project based on Project Serendip data and 100,000 personal computers. In: Astronomical and Biochemical Origins and the Search for Life in the Universe. Proc. of the Fifth Intl. Conf. on Bioastronomy (1997)Google Scholar
  7. 7.
    Verbeke, J., Nadgir, N., Ruetsch, G., Sharapov, I., Parashar, M.: Framework for Peer-to-Peer Distributed Computing in a Heterogeneous, Decentralized Environment. In: Parashar, M. (ed.) GRID 2002. LNCS, vol. 2536, pp. 1–12. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory, RFC 2693 (1999)Google Scholar
  9. 9.
    Plaxton, C., Rajaraman, R., Richa, A.: Accessing nearby copies of replicated objects in a distributed environment. In: Proceedings of the ACM SPAA (1997)Google Scholar
  10. 10.
    Ajmani, S., Clarke, D.E., Moh, C.-H., Richman, S.: ConChord: Cooperative SDSI certificate storage and name resolution. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 141–154. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: ACM SIGCOMM (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yong Ma
    • 1
  • Yumin Tian
    • 1
  1. 1.School of Computer Science & TechnologyXidian UniversityXianChina

Personalised recommendations