Mast Cornellgrad 0058F 12280.Pdf (2.365Mb)

Total Page:16

File Type:pdf, Size:1020Kb

Mast Cornellgrad 0058F 12280.Pdf (2.365Mb) Protocols for Building Secure and Scalable Decentralized Applications A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Kai Mast December 2020 © 2020 Kai Mast ALL RIGHTS RESERVED Protocols for Building Secure and Scalable Decentralized Applications Kai Mast, Ph.D. Cornell University 2020 Decentralized ledger technologies distribute data and execution across a public peer- to-peer network, which allows for more democratic governance of distributed systems and enables tolerating Byzantine failures. However, current protocols for such decen- tralized ledgers are limited in performance as they require every participant of the protocol to execute and validate every operation. Because of this, systems such as Bitcoin or Ethereum are limited in their throughput to around 10 transaction per sec- ond. Additionally, current implementations provide virtually no privacy to individual users, which precludes decentralized ledgers from being used in many real-world ap- plications. This thesis analyses the scalability and privacy limitations of current protocols and discusses means to improve them in detail. It then outlines two novel protocols for building decentralized ledgers, their implementation, and evaluates their performance under realistic workloads. First, it introduces the BitWeave, a blockchain protocol enabling parallel transac- tion validation and serialization while maintaining the same safety and liveness guaran- tees provided by Bitcoin. BitWeave partitions the system’s workload across multiple distinct shards, each of which then executes transactions mostly independently, while allowing for serializable cross-shard transactions. Second, it discusses DataPods, which is a database architecture and programming abstraction that combines the safety properties of decentralized systems with the scala- bility and confidentiality of centralized systems. Each data pod is akin to a conventional database instance with the addition of enabling users to detect and resolve misbehav- ior with the help of a global ledger. Further, data pods are interoperable with each other through federated transactions, enable confidentiality of data, and allow users to migrate their data in case of failure. BIOGRAPHICAL SKETCH Kai Mast was born in Böblingen, Germany. He received his Bachelor of Science degree from the University of Bamberg in 2014. While working towards his undergraduate degree, he researched general artificial intelligence with Dietrich Dörner and peer-to- peer networks with Udo R. Krieger. He wrote his undergraduate thesis on on-chip networks while visiting Intel Mobile Communications. His interest in peer-to-peer networks lead to him pursuing a Ph.D. at Cornell Uni- versity, working with Emin Gün Sirer. During his time at Cornell, his work revolved around secure database management systems and blockchain protocols. He spent the summer of 2016 at Microsoft Research Cambridge working with Anthony Rowstron and the summer of 2019 at U.C. Berkeley working with Dawn Song. For his minor studies in sociology, Kai Mast researched political alignment in social networks with Yongren Shi and Michael W. Macy. He received his Master of Science degree from Cornell in 2017 and his in doctorate in 2020. iii ACKNOWLEDGEMENTS There are many people without which I would not have been able to make this journey. During my undergraduate studies, Philipp Eittenberger and Dietrich Dörner were the first encouraging me to conduct research. Additionally, Udo Krieger and Todor Mladenov have been amazing mentors while at the University of Bamberg. My adviser Gün Sirer always helped me improve my research, coding, and technical writing skills. All members of the Cornell Community, and in particular the Cornell System Lab, have been great friends and colleagues. This includes, but is not limited to, Ayush, Deniz, Edward, Efe, Ethan, Florian, Harjasleen, Jack, Kevin, Matthew, Natacha, Robert, Shir, Soumya, Ted, Tom, Vera, Vlad, Xanda, and Yunhao. A particular highlight of my doctoral studies were the undergraduates I had the pleasure to work with: Lequn, Charles, Aaron, and Arzu. Internships have been an invaluable experience during, both, my undergraduate and graduate studies. I want to thank everybody at Elektrobit Automotive, Siemens Healthcare, Intel Mobile Communications, and Microsoft Research that I had the chance to interact with. Here, I want to especially thank Andreas Pokorny who helped me find and secure my first internship. Finally, I want to thank my family, my friends, my housemates, and, especially, my partner Sophie for all their support during the ups and downs of graduate school. iv TABLE OF CONTENTS 1 Introduction 1 1.1 Motivation .................................. 1 1.2 Decentralized Ledger Abstraction ..................... 3 1.2.1 Consistency ............................. 4 1.2.2 Immutability ............................ 5 1.2.3 Auditability ............................. 6 1.3 Decentralized Ledger Technologies .................... 6 1.3.1 Assumptions and Attack Model .................. 7 1.3.2 Sybil Detection ........................... 7 1.3.3 Committee-Based Consensus ................... 8 1.3.4 Nakamoto Consensus ....................... 9 1.3.5 Bottlenecks ............................. 11 1.4 Existing Approaches for Scaling Blockchains ............... 13 1.4.1 Off-Chain Protocols ........................ 13 1.4.2 Sharding Blockchains ....................... 13 1.5 Challenges in Sharding Blockchains .................... 14 1.5.1 Maintaining Safety ......................... 14 1.5.2 Ensuring Consistency ....................... 15 1.5.3 Maintaining Decentralization ................... 15 1.5.4 Providing Sound Incentive Mechanisms ............. 16 1.6 Thesis Contributions ............................ 16 1.6.1 BitWeave: Audit-based Sharding for Blockchains ....... 17 1.6.2 DataPods: Federated Decentralized Databases ......... 17 1.7 Thesis Outline ................................ 18 2 Abstractions for Scalable Decentralized Applications 19 2.1 Transaction Fees and Digital Payments .................. 19 2.2 Existing Data Models for Decentralized Ledgers ............. 19 2.2.1 The UTXO Model .......................... 20 2.2.2 The Accounts Model ........................ 22 2.3 Smart Contracts ............................... 24 2.3.1 Limitations of Smart Contracts .................. 26 2.4 Concurrent Decentralized Applications .................. 26 2.4.1 Objects and Object Types ..................... 27 2.4.2 Application Functions ....................... 28 2.4.3 Reservations ............................. 28 2.4.4 Implementation ........................... 30 2.5 Chapter Summary .............................. 30 v 3 BitWeave: Audit-based Sharding for Blockchains 31 3.1 Foundation: Bitcoin-NG ........................... 33 3.2 Blockchain Structure ............................ 33 3.3 Consensus Abstraction ........................... 35 3.4 Roles in BitWeave ............................. 36 3.4.1 Epoch Leaders ............................ 36 3.4.2 Shard Followers ........................... 36 3.4.3 Shard Commanders ......................... 37 3.5 Transaction Processing Overview ..................... 37 3.5.1 Reservations ............................. 38 3.5.2 Commits and Aborts ........................ 39 3.5.3 Efficient Cross-Shard Communication .............. 39 3.5.4 Transaction Fees and Miner Rewards ............... 40 3.6 Fault-Tolerant Transaction Processing ................... 42 3.6.1 Detecting Fraud ........................... 43 3.6.2 Fraud-Proofs ............................ 44 3.6.3 Incentivizing Fraud-Finding Behavior .............. 45 3.6.4 Ensuring Shard Availability .................... 46 3.6.5 Adaptive Confirmation Intervals ................. 48 3.7 Correctness ................................. 49 3.7.1 Safety ................................ 51 3.7.2 Liveness ............................... 53 3.8 Case Studies ................................. 54 3.8.1 Applying BitWeave to Ethereum ................. 54 3.8.2 Applying BitWeave to Bitcoin .................. 56 3.9 Implementation Details ........................... 57 3.9.1 Reducing Transaction Footprint .................. 58 3.9.2 Block Size and Epoch Length ................... 58 3.9.3 Congestion Control ......................... 59 3.10 Experimental Evaluation .......................... 60 3.10.1 How well does BitWeave’s overall throughput scale? ..... 63 3.10.2 How does sharding affect the transaction footprint? ...... 63 3.10.3 What is the overhead generated by cross-shard messages? ... 64 3.10.4 How well does the protocol handle failures? ........... 64 3.11 Discussion and Open Problems ....................... 65 3.11.1 Shortening CHALLENGE Periods .................. 65 3.11.2 Reducing Chain Size ........................ 66 3.11.3 Adapting to Changing Workloads ................. 67 3.12 Chapter Summary .............................. 68 4 DataPods: Federated Decentralized Databases 69 4.1 Foundation: Trusted Execution Environments .............. 70 4.2 The DataPods Architecture ........................ 72 4.2.1 Assumptions and Attack Model .................. 74 vi 4.2.2 Global Ledger Abstraction ..................... 74 4.2.3 Application Programming Interface ................ 75 4.2.4 Authenticated Private Storage ................... 77 4.2.5 Secure Function Evaluation .................... 81 4.2.6 Detecting Data Pod Failure .................... 81 4.2.7
Recommended publications
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • North Korea Purloins Russian Technology to Add Teeth to Its Military Caliber
    NEW DELHI TIMES R.N.I. No 53449/91 DL-SW-01/4124/17-19 (Monday/Tuesday same week) (Published Every Monday) New Delhi Page 16 Rs. 7.00 22 - 28 July 2019 Vol - 29 No. 25 Email : [email protected] Founder : Dr. Govind Narain Srivastava ISSN -2349-1221 Modi irradiates Christian victims of loopholed Defence Muslim oppression Procurement rot in Thailand With the world at large progressing with positive The country code of 66 on the incoming call speed and the concept of globalization seeing was unfamiliar, as was the number. its frutation with the spread of co-operative Usually I ignore such calls as they invariably and collaborative networks worldwide; among are threats from the worldwide network of the civic, economic and political spheres, the my fans or duct-cleaning companies worried defence sector of any nation in the modern about the air I breathe. But on that day, I took era becomes the top-priority... a chance. The other option... By Dr. Ankit Srivastava Page 3 By Tarek Fatah Page 2 North Korea purloins Russian technology to add teeth to its Military Caliber By NDT Special Bureau Page 2 Babies growing up with animals, Belief aids to climb the ladder Iran and its prospects for build stronger immune system of Success Democracy I meet so many mothers who won’t let their children walk All of us are on a daily struggle to be successful so as to be More than 80 million Iranians at home or living across the barefoot in the house or the park, won’t let them touch able to establish ourselves in society.
    [Show full text]
  • Protokolle Im Fediverse
    Protokolle im Fediverse Jens Lechtenbörger Oktober 2018 1 Einleitung Wie bereits diskutiert setzen Dezentralisierung und Föderation gemeinsame Standards voraus. Während das Fediverse als Federated Universe im engeren Sinne Funktionalitäten von Social Media basierend auf freier Software und föderierten Servern umfasst, gehören im weiteren Sinne auch andere Formen von Kommunikation dazu. Zu Protokollen, die mir besonders vielversprechend erscheinen, geben die folgenden Abschnitte weitere Informationen bzw. führen zu externen Quellen. 2 ActivityPub Als prominenter Vertreter von Fediverse-Protokollen im engeren Sinne wurde im Januar 2018 ActivityPub vom World Wide Web Consortium (W3C) stan- dardisiert. Der Implementation Report dokumentiert den Stand der Umset- zung von ActivityPub durch diverse Anwendungen. Lesen Sie die ActivityPub-Spezikation so weit, dass Sie folgende Fragen beantworten können: Was sind Actors, Objects und Activities? Welche Rollen spielen Inbox und Outbox für die Kommunikation? 3 XMPP Das klassische Beispiel föderierter Internet-Dienste ist die E-Mail für asyn- chrone Kommunikation (auch für Gruppenkommunikation, mit Anhängen aller Art). Für synchrone Echtzeit-Chats bietet das Extensible Messaging and Pres- ence Protocol (XMPP) einen auf dem Austausch von XML-Nachrichten basierenden oenen Standard, der aus dem um die Jahrtausendwende en- twickelten Jabber hervorgegangen ist. Heute wird XMPP nicht nur in 1 Messengern genutzt, sondern auch als Middleware im Internet der Dinge. XMPP-Server bilden analog zu E-Mail-Servern eine Föderation, so dass Be- nutzer unterschiedlicher, dezentral administrierter Server miteinander kom- munizieren können. Die Kommunikation setzt sogenannte Jabber IDs (JIDs) voraus, die zunächst wie E-Mail-Adressen aussehen ([email protected]), aber darüber hinaus auch Client-Anwendungen auf unterschiedlichen Geräten identi- zieren können ([email protected]/work-pc).
    [Show full text]
  • 2.3 Blockchain
    POLITECNICO DI TORINO Corso di Laurea Magistrale in Ingegneria Informatica - Data Science Tesi di Laurea Magistrale Supporting the portability of profiles using the blockchain in the Mastodon social network Relatore Candidato prof. Giovanni Squillero Alessandra Rossaro Anno Accademico 2018-2019 École polytechnique de Louvain Supporting the portability of profiles using the blockchain in the Mastodon social network Authors: Alessandra ROSSARO, Corentin SURQUIN Supervisors: Etienne RIVIERE, Ramin SADRE Readers: Lionel DRICOT, Axel LEGAY, Giovanni SQUILLERO Academic year 2018–2019 Master [120] in Computer Science Acknowledgements We would like to thank anyone who made the writing of this thesis possible, directly or indirectly. First of all, we would like to thank our supervisors, Prof. Etienne Riviere and Prof. Ramin Sadre for their continous support and advice during the year. We would never have gone this far without them. Secondly, we thank Lionel Dricot, Prof. Axel Legay and Prof. Giovanni Squillero for accepting to be the readers of this thesis. Alessandra First of all, I would like to thank my family, my parents Claudia and Alberto, my brother Stefano and my sister Eleonora, that from the beginning of my studies believed in me, every time urging me to give more and sustaining me each time that I had difficulties. They are my strength and I feel really lucky to have them in my life. Another thanks is to my friends, to Soraya, Beatrice, Sinto and Stefano and especially to Matteo and Edoardo that each time that I needed, remember me to believe in myself and don’t give up. Thank you, sincerely! I would like to thank also my partner, Corentin, because we were a great team, sometimes with some misunderstandings, but I appreciated to work at this project with him! Corentin I must express my deep gratitude to my family and friends for their moral support.
    [Show full text]
  • Decentralized Identifier WG F2F Sessions
    Decentralized Identifier WG F2F Sessions Day 1: January 29, 2020 Chairs: Brent Zundel, Dan Burnett Location: Microsoft Schiphol 1 Welcome! ● Logistics ● W3C WG IPR Policy ● Agenda ● IRC and Scribes ● Introductions & Dinner 2 Logistics ● Location: “Spaces”, 6th floor of Microsoft Schiphol ● WiFi: SSID Publiek_theOutlook, pwd Hello2020 ● Dial-in information: +1-617-324-0000, Meeting ID ● Restrooms: End of the hall, turn right ● Meeting time: 8 am - 5 pm, Jan. 29-31 ● Breaks: 10:30-11 am, 12:30-1:30 pm, 2:30-3 pm ● DID WG Agenda: https://tinyurl.com/didwg-ams2020-agenda (HTML) ● Live slides: https://tinyurl.com/didwg-ams2020-slides (Google Slides) ● Dinner Details: See the “Dinner Tonight” slide at the end of each day 3 W3C WG IPR Policy ● This group abides by the W3C patent policy https://www.w3.org/Consortium/Patent-Policy-20040205 ● Only people and companies listed at https://www.w3.org/2004/01/pp-impl/117488/status are allowed to make substantive contributions to the specs ● Code of Conduct https://www.w3.org/Consortium/cepc/ 4 Today’s agenda 8:00 Breakfast 8:30 Welcome, Introductions, and Logistics Chairs 9:00 Level setting Chairs 9:30 Security issues Brent 10:15 DID and IoT Sam Smith 10:45 Break 11:00 Multiple Encodings/Different Syntaxes: what might we want to support Markus 11:30 Different encodings: model incompatibilities Manu 12:00 Abstract data modeling options Dan Burnett 12:30 Lunch (brief “Why Are We Here?” presentation) Christopher Allen 13:30 DID Doc Extensibility via Registries Mike 14:00 DID Doc Extensibility via JSON-LD Manu
    [Show full text]
  • A Distributed, Cooperative Citeseer
    OverCite: A Distributed, Cooperative CiteSeer Jeremy Stribling, Jinyang Li,† Isaac G. Councill,†† M. Frans Kaashoek, Robert Morris MIT Computer Science and Artificial Intelligence Laboratory †New York University and MIT CSAIL, via UC Berkeley ††Pennsylvania State University Abstract common for non-commercial Web sites to be popular yet to lack the resources to support their popularity. Users of CiteSeer is a popular online resource for the computer sci- such sites are often willing to help out, particularly in the ence research community, allowing users to search and form of modest amounts of compute power and network browse a large archive of research papers. CiteSeer is ex- traffic. Examples of applications that thrive on volunteer pensive: it generates 35 GB of network traffic per day, re- resources include SETI@home, BitTorrent, and volunteer quires nearly one terabyte of disk storage, and needs sig- software distribution mirror sites. Another prominent ex- nificant human maintenance. ample is the PlanetLab wide-area testbed [36], which is OverCite is a new digital research library system that made up of hundreds of donated machines over many dif- aggregates donated resources at multiple sites to provide ferent institutions. Since donated resources are distributed CiteSeer-like document search and retrieval. OverCite en- over the wide area and are usually abundant, they also al- ables members of the community to share the costs of run- low the construction of a more fault tolerant system using ning CiteSeer. The challenge facing OverCite is how to a geographically diverse set of replicas. provide scalable and load-balanced storage and query pro- In order to harness volunteer resources at many sites, a cessing with automatic data management.
    [Show full text]
  • Scooped, Again
    Scooped, Again The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Ledlie, Jonathan, Jeff Shneidman, Margo Seltzer, and John Huth. 2003. Scooped, again. Peer-to-peer systems II: Second international workshop, IPTPS 2003, Berkeley, California, February 21-22, 2003, ed. IPTPS 2003, Frans Kaashoek, and Ion Stoica. Berlin: Springer Verlang. Previously published in Lecture Notes in Computer Science 2735: 129-138. Published Version http://dx.doi.org/10.1007/b11823 Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:2799042 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Scooped, Again Jonathan Ledlie, Jeff Shneidman, Margo Seltzer, John Huth Harvard University jonathan,jeffsh,margo ¡ @eecs.harvard.edu [email protected] Abstract p2p Grid Users (scientists) users Users (disparate The Peer-to-Peer (p2p) and Grid infrastructure commu- groups ) ©§ nities are tackling an overlapping set of problems. In ad- App. ¢¤£¦¥§¥§¨writers place demand demand dressing these problems, p2p solutions are usually moti- demand (e.g., on vated by elegance or research interest. Grid researchers, App. writers OGSA) writers} under pressure from thousands of scientists with real file research and Infrastructure writers Infrastructure writers sharing and computational needs, are pooling their solu- development tions from a wide range of sources in an attempt to meet user demand. Driven by this need to solve large scientific Figure 1: In serving their well-defined user base, the problems quickly, the Grid is being constructed with the Grid community has needed to draw from both its ances- tools at hand: FTP or RPC for data transfer, centraliza- try of supercomputing and from Systems research (in- tion for scheduling and authentication, and an assump- cluding p2p and distributed computing).
    [Show full text]
  • Inscribing the Blockchain with Digital Signatures of Signed RDF Graphs. a Worked Example of a Thought Experiment
    Inscribing the blockchain with digital signatures of signed RDF graphs. A worked example of a thought experiment. The thing is, ad hoc hash signatures on the blockchain carry no information linking the hash to the resource for which the hash is acting as a digital signature. The onus is on the inscriber to associate the hash with the resource via a separate communications channel, either by publishing the association directly or making use of one of the third-party inscription services that also offer a resource persistence facility – you get to describe what is signed by the hash and they store the description in a database, usually for a fee, or you can upload the resource for storage, definitely for a fee. Riccardo Cassata has a couple of technical articles that expose more of the practical details: https://blog.eternitywall.it/2016/02/16/how-to-verify-notarization/ So what's published is a hexadecimal string indistinguishable from all the others which purportedly matches the hash of Riccardo's mugshot. But which? https://tineye.com/search/ed9f8022c9af413a350ec5758cda520937feab21 What’s needed is a means of creating an inscription that is not only a signature but also a resovable reference to the resource for which it acts as a digital signature. It would be even better if it were possible to create a signature of structured information, such as that describing a social media post – especially if we could leverage off’ve the W3’s recent Activity Streams standard: https://www.w3.org/TR/activitystreams-core/ An example taken from the
    [Show full text]
  • Federation Documentation Release 0.22.0
    Federation Documentation Release 0.22.0 Jason Robinson Aug 15, 2021 Contents 1 Introduction 3 1.1 Status...................................................4 1.2 Additional information..........................................4 2 Install 7 2.1 Dependencies...............................................7 2.2 Installation................................................7 3 Protocols 9 3.1 Diaspora.................................................9 3.2 ActivityPub................................................ 10 3.3 Matrix.................................................. 11 4 Usage 13 4.1 Entities.................................................. 13 4.2 Discovery................................................. 15 4.3 Fetchers.................................................. 18 4.4 Inbound.................................................. 19 4.5 Outbound................................................. 19 4.6 Django.................................................. 19 4.7 Protocols................................................. 21 4.8 Utils................................................... 21 4.9 Exceptions................................................ 23 5 Development 25 5.1 Environment setup............................................ 25 5.2 Running tests............................................... 25 5.3 Building local documentation...................................... 25 5.4 Contact for help............................................. 26 6 Projects using federation 27 7 Changelog 29 7.1 [0.22.0] - 2021-08-15.........................................
    [Show full text]
  • K-ICT · Ver.2017 –
    http://www.tta.or.kr K-ICT Ver.2017 – /SW/ SW· - ( / , / , ), SW( , SW ), SW· ( / , ) TTA - 16142 - SD Service offering ( | ) ~'19, JTC1 SC34, IDPF, W3C ( | ) ~'19, JTC1 SC29 WG11 AR/VR App. AV App. ( ) KS X 6070-1~5 (EPUB) 3.0 , (EPUB) 3.0, (EPUB) 3.0, e-Learning App. (TTA) TTA.KO-10.0611 - Digital Signage App. Web App. , 2016-118 ( | ) ~'18, JTC1 SC29 WG11, SC24 ( | ) ~'18, JTC1 SC29 WG11 (EPUB) 3.0, (EPUB) 3.0 / SNS App. (HMD) (TTA) TTAK.OT-10.0337 - EPUB 2 , .0338 - EPUB 3.0, .0339 - EPUB , 2016-119 PC (TTA) TTAK.KO-10.0874 – (TTA) TTAK.KO-10.0317- 3.0, .0340 - EPUB 3 , .0341 - EPUB 3.0, .0342 - EPUB A/V/Data Terminal Control, (HMD) / 3.0, .0727 - EPUB , KR04-1 - EPUB3 EDUPUB , -2 - EPUB Service Info. Management (JTC1) Exploration Part # 12(Free-viewpoint TV) 1.0, -3 - EPUB 1.0, -4 - EPUB 1.0 DRM Service (JTC1) ISO/IEC 23000-13 Information technology - Call for Evidence on Free-Viewpoint Television: (JTC1) ISO/IEC 14496-10:2012 , NTP/ (ODPF) KR03-1 - EPUB 3.0.1 , -2 - EPUB 3.0.1, -3 - EPUB 3.0.1, -4 - EPUB Discovery ID Network DHCP DNS IGMP - Multimedia application format (MPEG-A) -- Part Super-Multiview and Free Navigation – update, Information technology -- Coding of 3.0.1, -5 - EPUB 3.0.1, -6 - EPUB 3.0.1 ( | ) ~'19, Web3D, JTC1 SC24 WG6/WG9, JTC1 SC29, JTC1 SC35, JTC1 SC36 MPEG / H.264, 265 audio-visual objects -- Part 10: Advanced agent Provisioning SNTP 13: Augmented reality application format, ISO/IEC Exploration Part # 12(Free-viewpoint TV) - FTV HDR (ISO TC171 SC2) ISO 32000-1 - PDF(portable document format) 23005-5 Information
    [Show full text]
  • Hyperwell: Local-First, Collaborative Notebooks for Digital Annotation
    Hyperwell: Local-First, Collaborative Notebooks for Digital Annotation A thesis presented for the degree of Master of Science by Jan Kaßel [email protected] 3724135 at the Institute of Computer Science Universität Leipzig, Germany May 4, 2020 Advisor & First Examiner Second Examiner Dr. Thomas Köntges Prof. Gregory Crane Chair of Digital Humanities Department of Classical Studies Leipzig University Tufts University Except where otherwise noted, content in this thesis is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License¹, which permits un- restricted adaption, use, and distribution in any medium, provided the original work is properly cited the resulting work is licensed under the same terms as the original. The source code of all Hyperwell repositories is available as open-source soft- ware, licensed under the more permissive MIT License. Copyright 2020, Jan Kaßel. 1. https://creativecommons.org/licenses/by-sa/4.0/ Table of Contents Abstract i Acknowledgements ii List of Abbreviations iii List of Figures iv 1 Introduction 1 1.1 Motivation: A Question of Ownership ................ 3 1.2 Research Goals and Affiliated Work ................. 4 1.3 Synopsis ................................ 5 2 Related Work 7 2.1 Hypertext and Annotation ....................... 7 2.2 Digital Real-Time Collaboration ................... 10 2.3 Linked Data and Digital Humanities . 12 2.4 Peer-to-Peer Networks ........................ 16 2.5 Local-First Applications ........................ 20 3 Study: Exploring Collaborative Workflows 22 3.1 Study Framework ........................... 25 3.2 Analyzing Digital Workflows ..................... 27 3.3 Setting and Observations ....................... 30 3.4 Results ................................. 32 4 Peer-to-Peer Annotation 35 4.1 What’s (Not) Wrong with Servers? .
    [Show full text]