
The principle of distribution
Author(s) -
Reed G.M.,
Sanders J.W.
Publication year - 2008
Publication title -
journal of the american society for information science and technology
Language(s) - English
Resource type - Journals
eISSN - 1532-2890
pISSN - 1532-2882
DOI - 10.1002/asi.20854
Subject(s) - computer science , abstraction , standardization , ubiquitous computing , context (archaeology) , distributed computing , computer security , control (management) , distribution (mathematics) , authentication (law) , normative , software deployment , space (punctuation) , risk analysis (engineering) , human–computer interaction , software engineering , artificial intelligence , law , mathematics , medicine , paleontology , mathematical analysis , philosophy , epistemology , political science , biology , operating system
This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution , says that in a distributed multi‐agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi‐agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high‐level discussion that ought to precede the more low‐level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open‐source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.