메뉴 건너뛰기




Volumn , Issue , 2007, Pages 175-188

PeerReview: Practical accountability for distributed systems

Author keywords

Accountability; Byzantine faults; Distributed systems; Fault detection

Indexed keywords

BYZANTINE FAULT; BYZANTINE FAULTS; DISTRIBUTED SYSTEMS; FALSE-ACCUSATION; FAULTY NODE; FILESYSTEM; OVERLAY MULTICAST SYSTEMS; PEER-TO-PEER SYSTEM; REFERENCE IMPLEMENTATION; SIGN MESSAGES;

EID: 58049120018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (141)

References (59)
  • 7
    • 0141441473 scopus 로고    scopus 로고
    • Simplifying fault-tolerance: Providing the abstraction of crash failures
    • R. A. Bazzi and G. Neiger. Simplifying fault-tolerance: Providing the abstraction of crash failures. J. ACM, 48(3):499-554, 2001.
    • (2001) J. ACM , vol.48 , Issue.3 , pp. 499-554
    • Bazzi, R.A.1    Neiger, G.2
  • 8
    • 0023451681 scopus 로고
    • Asynchronous Byzantine agreement protocols
    • Nov
    • G. Bracha. Asynchronous Byzantine agreement protocols. Information and Computation, 75(2):130-143, Nov 1987.
    • (1987) Information and Computation , vol.75 , Issue.2 , pp. 130-143
    • Bracha, G.1
  • 9
    • 0022144724 scopus 로고
    • Asynchronous consensus and broadcast protocols
    • G. Bracha and S. Toueg. Asynchronous consensus and broadcast protocols. Journal of the ACM, 32(4), 1985.
    • (1985) Journal of the ACM , vol.32 , Issue.4
    • Bracha, G.1    Toueg, S.2
  • 13
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst., 20(4):398-461, 2002.
    • (2002) ACM Trans. Comput. Syst , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 14
    • 2442619381 scopus 로고    scopus 로고
    • BASE: Using abstraction to improve fault tolerance
    • M. Castro, R. Rodrigues, and B. Liskov. BASE: Using abstraction to improve fault tolerance. ACM Trans. Comput. Syst., 21(3):236-269, 2003.
    • (2003) ACM Trans. Comput. Syst , vol.21 , Issue.3 , pp. 236-269
    • Castro, M.1    Rodrigues, R.2    Liskov, B.3
  • 15
    • 0030102105 scopus 로고    scopus 로고
    • Unreliable failure detectors for reliable distributed systems
    • Mar
    • T. D. Chandra and S. Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2):225-267, Mar 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.2 , pp. 225-267
    • Chandra, T.D.1    Toueg, S.2
  • 16
    • 59249102694 scopus 로고    scopus 로고
    • Attested append-only memory: Making adversaries stick to their word
    • Oct
    • B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: Making adversaries stick to their word. In Proc. SOSP, Oct 2007.
    • (2007) Proc. SOSP
    • Chun, B.-G.1    Maniatis, P.2    Shenker, S.3    Kubiatowicz, J.4
  • 17
    • 0024133214 scopus 로고
    • A compiler that increases the fault tolerance of asynchronous protocols
    • B. A. Coan. A compiler that increases the fault tolerance of asynchronous protocols. IEEE Trans. Computers, 37(12):1541-1553, 1988.
    • (1988) IEEE Trans. Computers , vol.37 , Issue.12 , pp. 1541-1553
    • Coan, B.A.1
  • 18
    • 13244268792 scopus 로고    scopus 로고
    • Samsara: Honor among thieves in peer-to-peer storage
    • Oct
    • L. P. Cox and B. D. Noble. Samsara: Honor among thieves in peer-to-peer storage. In Proceedings of SOSP, Oct 2003.
    • (2003) Proceedings of SOSP
    • Cox, L.P.1    Noble, B.D.2
  • 22
    • 84881247999 scopus 로고    scopus 로고
    • Muteness failure detectors: Specification and implementation
    • A. Doudou, B. Garbinato, R. Guerraoui, and A. Schiper. Muteness failure detectors: Specification and implementation. In EDCC, pages 71-87, 1999.
    • (1999) EDCC , pp. 71-87
    • Doudou, A.1    Garbinato, B.2    Guerraoui, R.3    Schiper, A.4
  • 23
    • 78650880166 scopus 로고    scopus 로고
    • Flexible OS support and applications for trusted computing
    • May
    • T. Garfinkel, M. Rosenblum, and D. Boneh. Flexible OS support and applications for trusted computing. In Proc. HotOS'03, May 2003.
    • (2003) Proc. HotOS'03
    • Garfinkel, T.1    Rosenblum, M.2    Boneh, D.3
  • 24
    • 41149104412 scopus 로고    scopus 로고
    • PeerReview: Practical accountability for distributed systems
    • Technical Report 2007-3, Max Planck Institute for Software Systems
    • A. Haeberlen, P. Kouznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. Technical Report 2007-3, Max Planck Institute for Software Systems.
    • Haeberlen, A.1    Kouznetsov, P.2    Druschel, P.3
  • 26
    • 85001706405 scopus 로고    scopus 로고
    • Glacier: Highly durable, decentralized storage despite massive correlated failures
    • May
    • A. Haeberlen, A. Mislove, and P. Druschel. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proc. NSDI, May 2005.
    • (2005) Proc. NSDI
    • Haeberlen, A.1    Mislove, A.2    Druschel, P.3
  • 27
    • 84861256450 scopus 로고    scopus 로고
    • Detection and removal of malicious peers in gossip-based protocols
    • Jun
    • M. Jelasity, A. Montresor, and O. Babaoglu. Detection and removal of malicious peers in gossip-based protocols. In Proceedings of FuDiCo, Jun 2004.
    • (2004) Proceedings of FuDiCo
    • Jelasity, M.1    Montresor, A.2    Babaoglu, O.3
  • 29
    • 0030704545 scopus 로고    scopus 로고
    • D. R. Karger, E. Lehman, F. T. Leighton, R. Panigrahy, M. S. Levine, and D. Lewin. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In STOC, 1997.
    • D. R. Karger, E. Lehman, F. T. Leighton, R. Panigrahy, M. S. Levine, and D. Lewin. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In STOC, 1997.
  • 30
    • 0012612234 scopus 로고    scopus 로고
    • Secure border gateway protocol (S-BGP) - real world performance and deployment issues
    • S. T. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure border gateway protocol (S-BGP) - real world performance and deployment issues. In NDSS, 2000.
    • (2000) NDSS
    • Kent, S.T.1    Lynn, C.2    Mikkelson, J.3    Seo, K.4
  • 33
    • 84976782029 scopus 로고
    • Using time instead of timeout for fault-tolerant distributed systems
    • L. Lamport. Using time instead of timeout for fault-tolerant distributed systems. ACM Trans. Prog. Lang. Syst., 6(2):254-280, 1984.
    • (1984) ACM Trans. Prog. Lang. Syst , vol.6 , Issue.2 , pp. 254-280
    • Lamport, L.1
  • 36
    • 33750367175 scopus 로고    scopus 로고
    • Network monitors and contracting systems: Competition and innovation
    • Sep
    • P. Laskowski and J. Chuang. Network monitors and contracting systems: competition and innovation. In Proc. SIGCOMM'06, pages 183-194, Sep 2006.
    • (2006) Proc. SIGCOMM'06 , pp. 183-194
    • Laskowski, P.1    Chuang, J.2
  • 38
    • 0030703957 scopus 로고    scopus 로고
    • Unreliable intrusion detection in distributed computations
    • D. Malkhi and M. K. Reiter. Unreliable intrusion detection in distributed computations. In CSFW, pages 116-125, 1997.
    • (1997) CSFW , pp. 116-125
    • Malkhi, D.1    Reiter, M.K.2
  • 40
  • 42
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • M. Naor and K. Nissim. Certificate revocation and certificate update. In Proc. USENIX Security Symposium, pages 217-228, 1998.
    • (1998) Proc. USENIX Security Symposium , pp. 217-228
    • Naor, M.1    Nissim, K.2
  • 43
    • 41149117131 scopus 로고
    • Automatically increasing the fault-tolerance of distributed systems
    • G. Neiger and S. Toueg. Automatically increasing the fault-tolerance of distributed systems. In PODC, pages 248-262, 1988.
    • (1988) PODC , pp. 248-262
    • Neiger, G.1    Toueg, S.2
  • 44
  • 45
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. C. Pease, R. E. Shostak, and L. Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, 1980.
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.C.1    Shostak, R.E.2    Lamport, L.3
  • 46
    • 84869671861 scopus 로고    scopus 로고
    • PeerReview project home
    • PeerReview project homepage. http://peerreview.mpi-sws.mpg.de/.
  • 47
    • 33847747833 scopus 로고    scopus 로고
    • A parsimonious approach for obtaining resource-efficient and trustworthy execution
    • 1-17, Jan
    • H. V. Ramasamy, A. Agbaria, and W. H. Sanders. A parsimonious approach for obtaining resource-efficient and trustworthy execution. IEEE Trans. on Dependable and Secure Comp., 4(1):1-17, Jan 2007.
    • (2007) IEEE Trans. on Dependable and Secure Comp , vol.4 , Issue.1
    • Ramasamy, H.V.1    Agbaria, A.2    Sanders, W.H.3
  • 48
    • 70449887722 scopus 로고    scopus 로고
    • P. Reynolds, O. Kennedy, E. G. Sirer, and F. B. Schneider. Securing BGP using external security monitors. Technical Report 2006-2065, Cornell University, Computing and Inform. Science, Dec 2006.
    • P. Reynolds, O. Kennedy, E. G. Sirer, and F. B. Schneider. Securing BGP using external security monitors. Technical Report 2006-2065, Cornell University, Computing and Inform. Science, Dec 2006.
  • 49
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 22(4):299-319, 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 50
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • Jan
    • B. Schneier and J. Kelsey. Cryptographic support for secure logs on untrusted machines. In Proc. 7th USENIX Security Symposium, pages 53-62, Jan 1998.
    • (1998) Proc. 7th USENIX Security Symposium , pp. 53-62
    • Schneier, B.1    Kelsey, J.2
  • 52
    • 0023399690 scopus 로고
    • Simulating authenticated broadcasts to derive simple fault-tolerant algorithms
    • T. K. Srikanth and S. Toueg. Simulating authenticated broadcasts to derive simple fault-tolerant algorithms. Distributed Computing, 2(2):80-94, 1987.
    • (1987) Distributed Computing , vol.2 , Issue.2 , pp. 80-94
    • Srikanth, T.K.1    Toueg, S.2
  • 53
    • 6144283432 scopus 로고    scopus 로고
    • Sun Microsystems Inc. RFC 1094:, Mar 1989
    • Sun Microsystems Inc. RFC 1094: Network file system protocol specification. http://www.ietf.org/rfc/rfc1094.txt, Mar 1989.
    • Network file system protocol specification
  • 54
    • 0035754863 scopus 로고    scopus 로고
    • Tangler: A censorship-resistant publishing system based on document entanglements
    • M. Waldman and D. Mazières. Tangler: a censorship-resistant publishing system based on document entanglements. In Proc. 8th ACM conf. on Comp. and Comm. Security, pages 126-135, 2001.
    • (2001) Proc. 8th ACM conf. on Comp. and Comm. Security , pp. 126-135
    • Waldman, M.1    Mazières, D.2
  • 55
    • 55149090014 scopus 로고    scopus 로고
    • Experience with an object reputation system for peer-to-peer filesharing
    • May
    • K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In Proc. NSDI, May 2006.
    • (2006) Proc. NSDI
    • Walsh, K.1    Sirer, E.G.2
  • 56
    • 21644446595 scopus 로고    scopus 로고
    • Separating agreement from execution for Byzantine fault tolerant services
    • Oct
    • J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating agreement from execution for Byzantine fault tolerant services. In Proc. SOSP, pages 253-267, Oct 2003.
    • (2003) Proc. SOSP , pp. 253-267
    • Yin, J.1    Martin, J.-P.2    Venkataramani, A.3    Alvisi, L.4    Dahlin, M.5
  • 58
    • 41149122088 scopus 로고    scopus 로고
    • The role of accountability in dependable distributed systems
    • Jun
    • A. R. Yumerefendi and J. S. Chase. The role of accountability in dependable distributed systems. In Proceedings of HotDep, Jun 2005.
    • (2005) Proceedings of HotDep
    • Yumerefendi, A.R.1    Chase, J.S.2
  • 59
    • 84885684056 scopus 로고    scopus 로고
    • Strong accountability for network storage
    • A. R. Yumerefendi and J. S. Chase. Strong accountability for network storage. In FAST, 2007.
    • (2007) FAST
    • Yumerefendi, A.R.1    Chase, J.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.