메뉴 건너뛰기




Volumn 16, Issue 3, 1994, Pages 986-1009

How to Securely Replicate Services

Author keywords

causality; replication; state machines; threshold cryptography

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; DATA HANDLING; DATA STRUCTURES; DISTRIBUTED COMPUTER SYSTEMS; FINITE AUTOMATA; INFORMATION SERVICES; NETWORK PROTOCOLS; SEQUENTIAL MACHINES; SUBROUTINES;

EID: 0028429699     PISSN: 01640925     EISSN: 15584593     Source Type: Journal    
DOI: 10.1145/177492.177745     Document Type: Article
Times cited : (65)

References (38)
  • 1
    • 84976814834 scopus 로고
    • Lightweight causal and atomic group multicast
    • (Aug.)
    • BIRMAN, K. P., SCHIPER, A., AND STEPHENSON, P. 1991. Lightweight causal and atomic group multicast. ACM Trans. Comput. Syst. 9, 3 (Aug.), 272-314.
    • (1991) ACM Trans. Comput. Syst. , vol.9 , Issue.3 , pp. 272-314
    • BIRMAN, K.P.1    SCHIPER, A.2    STEPHENSON, P.3
  • 2
    • 0038462781 scopus 로고
    • A survey of hardware implementations of RSA
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • BRICKELL, E. 1990. A survey of hardware implementations of RSA. In Advances in Cryptology-CRYPTO '89 Proceedings. Lecture Notes in Computer Science, vol. 435. Springer-Verlag, New York, 368-370.
    • (1990) Advances in Cryptology-CRYPTO '89 Proceedings , vol.435 , pp. 368-370
    • BRICKELL, E.1
  • 3
    • 0012242251 scopus 로고
    • Randomization in Byzantine agreement
    • CHOR, B., AND DWORK, C 1989. Randomization in Byzantine agreement. Adv. Comput Res. 5, 443-497.
    • (1989) Adv. Comput Res. , vol.5 , pp. 443-497
    • CHOR, B.1    DWORK, C.2
  • 4
    • 0022246697 scopus 로고
    • Atomic broadcast: From simple message diffusion to Byzantine agreement
    • 200-206. A revised version appears as IBM Res. Lab. Tech. Rep. RJ5244 (April 1989), IBM, Armonk, N.Y
    • CRISTIAN, F., AGHILI, H., STRONG, R., AND DOLEV, D. 1985. Atomic broadcast: From simple message diffusion to Byzantine agreement. In Proceedings of the 15th International Symposium on Fault-Tolerant Computing. 200-206. A revised version appears as IBM Res. Lab. Tech. Rep. RJ5244 (April 1989), IBM, Armonk, N.Y.
    • (1985) Proceedings of the 15th International Symposium on Fault-Tolerant Computing
    • CRISTIAN, F.1    AGHILI, H.2    STRONG, R.3    DOLEV, D.4
  • 5
    • 84976740532 scopus 로고
    • Digital signatures with RSA and other public-key cryptosystems
    • (Apr.)
    • DENNING, D. E. 1984. Digital signatures with RSA and other public-key cryptosystems. Commun. ACM 27, 4 (Apr.), 388-392.
    • (1984) Commun. ACM , vol.27 , Issue.4 , pp. 388-392
    • DENNING, D.E.1
  • 6
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • DESMEDT Y., AND FRANKEL, Y. 1992 Shared generation of authenticators and signatures. In Advances in Cryptology-CRYPTO '91 Proceedings. Lecture Notes in Computer Science, vol. 576 Springer-Verlag, New York, 457-469.
    • (1992) Advances in Cryptology-CRYPTO '91 Proceedings , vol.576 , pp. 457-469
    • DESMEDT, Y.1    FRANKEL, Y.2
  • 7
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Lecture Notes in Computer Science, Springer-Verlag. New York
    • DESMEDT, Y., AND FRANKEL, Y. 1990. Threshold cryptosystems. In Advances in Cryptology-CRYPTO '89 Proceedings. Lecture Notes in Computer Science, vol. 435. Springer-Verlag. New York, 307-315.
    • (1990) Advances in Cryptology-CRYPTO '89 Proceedings , vol.435 , pp. 307-315
    • DESMEDT, Y.1    FRANKEL, Y.2
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • (July)
    • ELGAMAL, T. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory. IT-31, 4 (July), 469-472.
    • (1985) IEEE Trans. Inf. Theory. IT-31 , vol.4 , pp. 469-472
    • ELGAMAL, T.1
  • 11
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • (Apr.)
    • FISCHER, M. J., LYNCH, N. A., AND PATERSON, M. S. 1985. Impossibility of distributed consensus with one faulty process. J. ACM 32, 2 (Apr.), 374-382.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • FISCHER, M.J.1    LYNCH, N.A.2    PATERSON, M.S.3
  • 15
    • 84977284109 scopus 로고
    • How to make replicated data secure
    • Lecture Notes in Computer Science, vol 293. Springer-Verlag, New York
    • HERLIHY, M. P., AND TYGAR, J. D. 1988. How to make replicated data secure. In Advances in Cryptology-CRYPTO '87 Proceedings. Lecture Notes in Computer Science, vol 293. Springer-Verlag, New York, 379-391.
    • (1988) Advances in Cryptology-CRYPTO '87 Proceedings , pp. 379-391
    • HERLIHY, M.P.1    TYGAR, J.D.2
  • 16
    • 2342660026 scopus 로고
    • Towards the elimination of the effects of malicious logic: Fault tolerance approaches
    • NBS/NCSC, Washington, D.C.
    • JOSEPH, M. K. 1987. Towards the elimination of the effects of malicious logic: Fault tolerance approaches. In Proceedings of the 10th NBS/NCSC National Computer Security Conference. NBS/NCSC, Washington, D.C., 238-244.
    • (1987) Proceedings of the 10th NBS/NCSC National Computer Security Conference , pp. 238-244
    • JOSEPH, M.K.1
  • 19
    • 0017972109 scopus 로고
    • The implementation of reliable distributed multiprocess systems
    • a
    • LAMPORT, L. 1978a. The implementation of reliable distributed multiprocess systems. Comput. Netw. 2, 95-114.
    • (1978) Comput. Netw. , vol.2 , pp. 95-114
    • LAMPORT, L.1
  • 20
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • b, (July)
    • LAMPORT, L. 1978b. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (July), 558-565.
    • (1978) Commun. ACM , vol.21 , Issue.7 , pp. 558-565
    • LAMPORT, L.1
  • 21
    • 0026684778 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • (Nov.)
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • LAMPSON, B.1    ABADI, M.2    BURROWS, M.3    WOBBER, E.4
  • 22
    • 84937578837 scopus 로고
    • Another method for attaining security against adaptively chosen ciphertext attacks
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • LIM, C. H., AND LEE, P. J. 1994. Another method for attaining security against adaptively chosen ciphertext attacks. In Advances in Cryptology-CRYPTO '93 Proceedings. Lecture Notes in Computer Science, vol. 773. Springer-Verlag, New York, 420-434.
    • (1994) Advances in Cryptology-CRYPTO '93 Proceedings , vol.773 , pp. 420-434
    • LIM, C.H.1    LEE, P.J.2
  • 23
    • 84951741545 scopus 로고
    • VICTOR: An efficient RSA hardware implementation
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • ORUP, B., SVENDSEN, E., AND ANDREASEN, E. 1991. VICTOR: An efficient RSA hardware implementation. In Advances in Cryptology-EUROCRYPT '90 Proceedings. Lecture Notes in Computer Science, vol. 473. Springer-Verlag, New York, 245-252.
    • (1991) Advances in Cryptology-EUROCRYPT '90 Proceedings , vol.473 , pp. 245-252
    • ORUP, B.1    SVENDSEN, E.2    ANDREASEN, E.3
  • 24
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • (Apr.)
    • RABIN, M. O. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36, 2 (Apr.), 335-348.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • RABIN, M.O.1
  • 30
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • RIVEST, R. L. 1991. The MD4 message digest algorithm. In Advances in Cryptology-CRYPTO '90 Proceedings. Lecture Notes in Computer Science, vol. 537. Springer-Verlag, New York, 303-311.
    • (1991) Advances in Cryptology-CRYPTO '90 Proceedings , vol.537 , pp. 303-311
    • RIVEST, R.L.1
  • 31
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • (Feb.)
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • RIVEST, R.L.1    SHAMIR, A.2    ADLEMAN, L.3
  • 32
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • (Dec.)
    • SCHNEIDER, F. B. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comput. Surv. 22, 4 (Dec.), 299-319.
    • (1990) ACM Comput. Surv. , vol.22 , Issue.4 , pp. 299-319
    • SCHNEIDER, F.B.1
  • 33
    • 85034812994 scopus 로고
    • The RSA cryptography processor
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • SEDLAK, H. 1988. The RSA cryptography processor. In Advances in Cryptology: Proceedings of EUROCRYPT '87. Lecture Notes in Computer Science, vol. 304. Springer-Verlag, New York, 95-105.
    • (1988) Advances in Cryptology: Proceedings of EUROCRYPT '87 , vol.304 , pp. 95-105
    • SEDLAK, H.1
  • 35
    • 0026868479 scopus 로고
    • Principal features of the VOLTAN family of reliable node architectures for distributed systems
    • (May)
    • SHRIVASTAVA, S. K., EZHILCHELVAN, P. D., SPEIRS, N. A., TAO, S., AND TULLY, A. 1992. Principal features of the VOLTAN family of reliable node architectures for distributed systems. IEEE Trans. Comput. 41, 5 (May), 542-549.
    • (1992) IEEE Trans. Comput. , vol.41 , Issue.5 , pp. 542-549
    • SHRIVASTAVA, S.K.1    EZHILCHELVAN, P.D.2    SPEIRS, N.A.3    TAO, S.4    TULLY, A.5
  • 38
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • (June)
    • VOYDOCK, V. L., AND KENT, S. T. 1983. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June), 135-171.
    • (1983) ACM Comput. Surv. , vol.15 , Issue.2 , pp. 135-171
    • VOYDOCK, V.L.1    KENT, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.