Risky business: motivations for markets in programmable networks

作者: Ian Wakeman , David Ellis , Tim Owen , Julian Rathke , Des Watson

DOI: 10.1007/978-3-540-24715-9_23

关键词:

摘要: We believe that the problems of safety, security and resource usage combine to make it unlikely programmable networks will ever be viable without mechanisms transfer risk from platform provider user programmer. However, we have well established for managing - markets. In this paper argue establishment markets manage in running a piece software ensure is reflected on all stakeholders. describe strawman architecture third party computation network. Within architecture, identify two major novel features:- Dynamic price setting, reputation service. investigate feasibility these features provide evidence practical system can indeed built. Our contributions are argument providing management mechanism networks, development an economic model showing incentives developing better software, first analysis real transaction graph systems Internet commerce site.

参考文章(36)
R.J. Gibbens, F.P. Kelly, Resource pricing and the evolution of congestion control Automatica. ,vol. 35, pp. 1969- 1985 ,(1999) , 10.1016/S0005-1098(99)00135-1
Grzegorz Czajkowski, Thorsten von Eicken, JRes Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '98. ,vol. 33, pp. 21- 35 ,(1998) , 10.1145/286936.286944
Joan Feigenbaum, Scott Shenker, Distributed algorithmic mechanism design Proceedings of the 6th international workshop on Discrete algorithms and methods for mobile computing and communications - DIALM '02. pp. 1- 13 ,(2002) , 10.1145/570810.570812
I.M. Leslie, D. McAuley, R. Black, T. Roscoe, P. Barham, D. Evers, R. Fairbairns, E. Hyden, The design and implementation of an operating system to support distributed multimedia applications IEEE Journal on Selected Areas in Communications. ,vol. 14, pp. 1280- 1297 ,(1996) , 10.1109/49.536480
M.S. Greenberg, L.C. Byington, D.G. Harper, Mobile agents and security IEEE Communications Magazine. ,vol. 36, pp. 76- 85 ,(1998) , 10.1109/35.689634
C.A. Waldspurger, T. Hogg, B.A. Huberman, J.O. Kephart, W.S. Stornetta, Spawn: a distributed computational economy IEEE Transactions on Software Engineering. ,vol. 18, pp. 103- 117 ,(1992) , 10.1109/32.121753
Rajkumar Buyya, David Abramson, Jonathan Giddy, None, Nimrod/G: an architecture for a resource management and scheduling system in a global computational grid ieee international conference on high performance computing data and analytics. ,vol. 1, pp. 283- 289 ,(2000) , 10.1109/HPC.2000.846563
Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani Di Vimercati, Stefano Paraboschi, Pierangela Samarati, None, Choosing reputable servents in a P2P network the web conference. pp. 376- 386 ,(2002) , 10.1145/511446.511496
Albert-László Barabási, Réka Albert, Hawoong Jeong, Mean-field theory for scale-free random networks Physica A-statistical Mechanics and Its Applications. ,vol. 272, pp. 173- 187 ,(1999) , 10.1016/S0378-4371(99)00291-5
Xi-Ren Cao, Hong-Xia Shen, R. Milito, P. Wirth, Internet pricing with a game theoretical approach: concepts and examples IEEE ACM Transactions on Networking. ,vol. 10, pp. 208- 216 ,(2002) , 10.1109/90.993302