메뉴 건너뛰기




Volumn , Issue , 2005, Pages 179-190

Lazy verification in fault-tolerant distributed storage systems

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT OPERATIONS; STORAGE SYSTEMS; STORAGE-NODES; VERIFICATION;

EID: 33749411730     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RELDIS.2005.20     Document Type: Conference Paper
Times cited : (20)

References (27)
  • 3
    • 85084161619 scopus 로고
    • Heuristic cleaning algorithms in log-structured file systems
    • USENIX Association
    • T. Blackwell, J. Harris, and M. Seltzer. Heuristic cleaning algorithms in log-structured file systems. USENIX Annual Technical Conference, pages 277-288. USENIX Association, 1995.
    • (1995) USENIX Annual Technical Conference , pp. 277-288
    • Blackwell, T.1    Harris, J.2    Seltzer, M.3
  • 5
    • 33749387051 scopus 로고    scopus 로고
    • Brief announcement: Optimal resilience for erasure-coded Byzantine distributed storage
    • Springer
    • C. Cachin and S. Tessaro. Brief announcement: Optimal resilience for erasure-coded Byzantine distributed storage. International Symposium on Distributed Computing. Springer, 2005.
    • (2005) International Symposium on Distributed Computing
    • Cachin, C.1    Tessaro, S.2
  • 6
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • November
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 20(4):398-461, November 2002.
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 8
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • IEEE
    • P. Feldman. A practical scheme for non-interactive verifiable secret sharing. IEEE Symposium on Foundations of Computer Science, pages 427-437. IEEE, 1987.
    • (1987) IEEE Symposium on Foundations of Computer Science , pp. 427-437
    • Feldman, P.1
  • 10
  • 15
  • 17
    • 0033719035 scopus 로고    scopus 로고
    • An architecture for survivable coordination in large distributed systems
    • IEEE, April
    • D. Malkhi and M. K. Reiter. An architecture for survivable coordination in large distributed systems. IEEE Transactions on Knowledge and Data Engineering, 12(2): 187-202. IEEE, April 2000.
    • (2000) IEEE Transactions on Knowledge and Data Engineering , vol.12 , Issue.2 , pp. 187-202
    • Malkhi, D.1    Reiter, M.K.2
  • 19
    • 84982943258 scopus 로고
    • Non-interactive and informationtheoretic secure verifiable secret sharing
    • SpringerVerlag
    • T. P. Pedersen. Non-interactive and informationtheoretic secure verifiable secret sharing. Advances in Cryptology - CRYPTO, pages 129-140. SpringerVerlag, 1991.
    • (1991) Advances in Cryptology - CRYPTO , pp. 129-140
    • Pedersen, T.P.1
  • 20
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • ACM, April
    • M. O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2):335-348. ACM, April 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 21
    • 84948956297 scopus 로고
    • The Rampart toolkit for building high-integrity services
    • Lecture Notes in Computer Science 938
    • M. K. Reiter. The Rampart toolkit for building high-integrity services. Theory and Practice in Distributed Systems (Lecture Notes in Computer Science 938), pages 99-110, 1995.
    • (1995) Theory and Practice in Distributed Systems , pp. 99-110
    • Reiter, M.K.1
  • 22
    • 0026812659 scopus 로고
    • The design and implementation of a log-structured file system
    • ACM Press, February
    • M. Rosenblum and J. K. Ousterhout. The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, 10(1):2652. ACM Press, February 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , Issue.1 , pp. 2652
    • Rosenblum, M.1    Ousterhout, J.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.