Skip to main content

The Open-End Argument for Private Computing

  • Conference paper
  • First Online:
Handheld and Ubiquitous Computing (HUC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1707))

Included in the following conference series:

Abstract

A truly personal machine, called a private machine and implemented as a Personal Digital Assistant (PDA), is fundamentally different from traditional machines. It is personal and private in an unprecedented manner, and its modus operandi is such that network and power failures will not be rare. Designing distributed systems where PDAs are treated as “first class citizens” is a challenge.

Furthermore, private assets (electronic money, keys for authentication and opening doors) will be stored in PDAs. Ownership and control of these assets and the media that store and communicate them should remain with the user. This must be reflected in the design of systems for private computing.

We introduce the “open-ended argument” to describe the design strategy we used for designing a system that is designed to reveal information to the user (as opposed to hide it). We argue and show that when systems are designed this way, the user (a human) is better able to control the system and his personal data, as he can make better decisions than the system itself based on qualitative assessment of the provided information. The system we have designed and implemented under this design guidelines is presented and discussed.

Acknowledgments

Frode Fjeld, Åge Kvalnes and the anonymous referees gave us feedback that has improved the presentation. Arne Helme participated in the work on offline delegation. Working in the “PASTA laboratory” is very stimulating.

Funded by the GDD project of the Research Council of Norway (project number 112577/431).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Baggio. System support for transparency and network-aware adaptation in mobile environments. In ACM Symposium on Applied Computing special track on Mobile Computing Systems and Applications, Atlanta, Georgia, USA, February 1998. Also available as a research report: INRIA Research Report 3408, April 1998.

    Google Scholar 

  2. E. Brewer, R. H. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, S. Gribble, G. Hodes, T. Nguyen, V. Padmanabhan, M. Stemm, S. Seshan, and T. Henderson. A network architecture for heterogeneous mobile computing. IEEE Personal Communications Magazine, 5(5):8–24, October 1998.

    Article  Google Scholar 

  3. J. B. Dennis and E. C. van Horn. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155, March 1966.

    MATH  Google Scholar 

  4. D. K. Gifford. Weighted voting for replicated data. In Proceedings of 7th SOSP, pages 150-62. ACM Press, 1979.

    Google Scholar 

  5. A. Goscinski. Distributed Operating Systems, The Logical Design. Addison-Wesley, 1991.

    Google Scholar 

  6. A. Helme and T. Stabell-Kul∅. Offline delegation. In 8th Usenix Security Symposium, 1999. Accepted for publication.

    Google Scholar 

  7. A. D. Joseph, J. A. Tauber, and M. Frans Kaashoek. Mobile computing with the Rover toolkit. IEEE Transactions on Computers: Special issue on Mobile Computing, pages 337–352, March 1997.

    Google Scholar 

  8. J. J. Kistler. Disconnected operations in a distributed file system, volume 1002 of Lecture Notes in Computer Science. Springer Verlag, 1996.

    Google Scholar 

  9. J. J. Kistler and M. Satyanarayanan. Disconnected operation in the Coda file system. Transactions on Computer Systems, 10(1):3–25, February 1992.

    Article  Google Scholar 

  10. B. Lampson. Protection. In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437–443, Princeton University, March 1971. Reprinted in Operating Systems Review, 8, 1, January 1974, pp. 18-24.

    Google Scholar 

  11. B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, November 1992.

    Article  Google Scholar 

  12. G. Moxnes. Design og implementasjon av replikering file repository (in Norwegian). Masters thesis, Department of Computer Science, University of Troms∅, Norway, April 1997.

    Google Scholar 

  13. Brian D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R. Walker. Agile application-aware adaption for mobility. ACM SIGOPS Operating Systems Review, 31(5):276–287, Dec. 1997. in: SIGOPS’ 97. Proceedings of the sixteenth ACM symposium on Operating systems principles, pages 264-275.

    Article  Google Scholar 

  14. D. P. Reed, J. H. Saltzer, and D. D. Clark. Active networking and end-to-end arguments. IEEE Network, 12(3):69–71, May 1998.

    Google Scholar 

  15. J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277–288, November 1984.

    Article  Google Scholar 

  16. R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon. Design and implementation of the Sun Network Filesystem. In Summer conference proceedings, Portland 1985: June 11-14, 1985, Portland, Oregon USA, pages 119–130. USENIX, Summer 1985.

    Google Scholar 

  17. T. Stabell-Kul∅. File repository transfer protocol (frtp). Technical report, Department of Computer Science, University of Troms∅, Norway, February 1995.

    Google Scholar 

  18. J. G. Steiner, B. G Neumann, and J. I. Schiller. Kerberos: An Authentication System for Open Network Systems. In Proc. of the Winter 1988 Usenix Conference, pages 191–201, February 1988.

    Google Scholar 

  19. A. S. Tanenbaum, R. van Renesse, H. van Staveren, G. J. Sharp, S. J. Mullender, J. Jansen, and G. van Rossum. Experiences with the Amoeba distributed operating system. Comunication of the ACM, 33(12):46–63, December 1990.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stabell-Kul∅, T., Dillema, F., Fallmyr, T. (1999). The Open-End Argument for Private Computing. In: Gellersen, HW. (eds) Handheld and Ubiquitous Computing. HUC 1999. Lecture Notes in Computer Science, vol 1707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48157-5_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-48157-5_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66550-2

  • Online ISBN: 978-3-540-48157-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics