메뉴 건너뛰기




Volumn , Issue , 2008, Pages 163-176

DepSpace: A byzantine fault-tolerant coordination service

Author keywords

Byzantine fault tolerance; Confidentiality; Tuple space

Indexed keywords

BYZANTINE FAULT TOLERANCE; BYZANTINE FAULTS; CONFIDENTIALITY; COORDINATION MODELS; CRITICAL DATUM; OPEN DISTRIBUTED SYSTEMS; REPLICATED DATUM; SPACE AND TIME; TUPLE SPACE; TUPLE-SPACE COORDINATION MODELS;

EID: 57749193316     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352592.1352610     Document Type: Conference Paper
Times cited : (39)

References (45)
  • 7
    • 59249108264 scopus 로고    scopus 로고
    • Decoupled quorum-based Byzantine-resilient coordination in open distributed systems
    • 07-9, Dep. of Informatics, University of Lisbon, May
    • A. N. Bessani, M. Correia, J. S. Fraga, and L. C. Lung. Decoupled quorum-based Byzantine-resilient coordination in open distributed systems. Technical Report DI-FCUL TR 07-9, Dep. of Informatics, University of Lisbon, May 2007.
    • (2007) Technical Report DI-FCUL TR
    • Bessani, A.N.1    Correia, M.2    Fraga, J.S.3    Lung, L.C.4
  • 10
    • 0034627957 scopus 로고    scopus 로고
    • On the expressiveness of Linda coordination primitives
    • Jan
    • N. Busi, R. Gorrieri, and G. Zavattaro. On the expressiveness of Linda coordination primitives. Information and Computation, 156(1-2):90-121, Jan. 2000.
    • (2000) Information and Computation , vol.156 , Issue.1-2 , pp. 90-121
    • Busi, N.1    Gorrieri, R.2    Zavattaro, G.3
  • 11
    • 0033907102 scopus 로고    scopus 로고
    • Mobile agents coordination models for Internet applications
    • G. Cabri, L. Leonardi, and F. Zambonelli. Mobile agents coordination models for Internet applications. IEEE Computer, 33(2), 2000.
    • (2000) IEEE Computer , vol.33 , Issue.2
    • Cabri, G.1    Leonardi, L.2    Zambonelli, F.3
  • 13
    • 0024738868 scopus 로고
    • How to write parallel programs: A guide to the perplexed
    • Sept
    • N. Carriero and D. Gelernter. How to write parallel programs: a guide to the perplexed. ACM Computing Surveys, 21(3):323-357, Sept. 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.3 , pp. 323-357
    • Carriero, N.1    Gelernter, D.2
  • 14
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault-tolerance and proactive recovery
    • M. Castro and B. Liskov. Practical Byzantine fault-tolerance and proactive recovery. ACM Transactions on Computer Systems, 20(4), 2002.
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4
    • Castro, M.1    Liskov, B.2
  • 17
    • 59249093095 scopus 로고    scopus 로고
    • Codehaus. Groovy programing language homepage. Available at http://groovy.codehaus.org/, 2006.
    • Codehaus. Groovy programing language homepage. Available at http://groovy.codehaus.org/, 2006.
  • 19
    • 0023994903 scopus 로고
    • Consensus in the presence of partial synchrony
    • Apr
    • C. Dwork, N. A. Lynch, and L. Stockmeyer. Consensus in the presence of partial synchrony. Journal of the ACM, 35(2):288-322, Apr. 1988.
    • (1988) Journal of the ACM , vol.35 , Issue.2 , pp. 288-322
    • Dwork, C.1    Lynch, N.A.2    Stockmeyer, L.3
  • 34
    • 59249087483 scopus 로고    scopus 로고
    • R. R. Obelheiro, A. N. Bessani, L. C. Lung, and M. Correia. How practical are intrusion-tolerant distributed systems? DI-FCUL TR 06-15, Dep. of Informatics, University of Lisbon, Sept. 2006.
    • R. R. Obelheiro, A. N. Bessani, L. C. Lung, and M. Correia. How practical are intrusion-tolerant distributed systems? DI-FCUL TR 06-15, Dep. of Informatics, University of Lisbon, Sept. 2006.
  • 35
    • 0025564050 scopus 로고
    • Implementing fault-tolerant service using the state machine aproach: A tutorial
    • F. B. Schneider. Implementing fault-tolerant service using the state machine aproach: A tutorial. ACM Computing Surveys, 22(4), 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4
    • Schneider, F.B.1
  • 38
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir. How to share a secret. Communications of ACM, 22(11):612-613, Nov. 1979.
    • (1979) Communications of ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 40
    • 84881247246 scopus 로고    scopus 로고
    • Intrusion-tolerant architectures: Concepts and design
    • Architecting Dependable Systems, of
    • P. Verissimo, N. F. Neves, and M. P. Correia. Intrusion-tolerant architectures: Concepts and design. In Architecting Dependable Systems, volume 2677 of LNCS. 2003.
    • (2003) LNCS , vol.2677
    • Verissimo, P.1    Neves, N.F.2    Correia, M.P.3
  • 41
    • 0037210075 scopus 로고    scopus 로고
    • Coordination processes with Secure Spaces
    • Jan
    • J. Vitek, C. Bryce, and M. Oriol. Coordination processes with Secure Spaces. Science of Computer Programming, 46(1-2):163-193, Jan. 2003.
    • (2003) Science of Computer Programming , vol.46 , Issue.1-2 , pp. 163-193
    • Vitek, J.1    Bryce, C.2    Oriol, M.3
  • 45
    • 46749137739 scopus 로고    scopus 로고
    • Paxos at war
    • Technical Report UCAM-CL-TR-593, University of Cambridge Computer Laboratory, June
    • P. Zielinski. Paxos at war. Technical Report UCAM-CL-TR-593, University of Cambridge Computer Laboratory, June 2004.
    • (2004)
    • Zielinski, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.