메뉴 건너뛰기




Volumn , Issue , 2007, Pages 189-204

Attested append-only memory: Making adversaries stick to their word

Author keywords

Attested append only memory; Byzantine fault tolerance; Equivocation; Replicated state machines; Shared storage

Indexed keywords

BYZANTINE FAULT TOLERANCE; COMMON SOURCE; FAULT-TOLERANT; IS COSTS; LINEARIZABILITY; PROGRAMMING ABSTRACTIONS; PROTOCOL DESIGN; REPLICATED SYSTEMS; SHARED STORAGE; STATE MACHINE; STATE OF THE ART; TRUSTED SYSTEMS; UPPER BOUND;

EID: 59249102694     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (91)

References (40)
  • 1
    • 84869684928 scopus 로고    scopus 로고
    • Amazon S3. http://aws.amazon.com/s3/.
    • Amazon S3
  • 3
    • 84869664557 scopus 로고    scopus 로고
    • Java. http://java.sun.com/.
    • Java
  • 4
    • 84869686788 scopus 로고    scopus 로고
    • SFSlite. http://www.okws.org/doku.php?id=sfslite.
    • SFSlite
  • 5
    • 84869672052 scopus 로고    scopus 로고
    • Trusted Computing Group TCG
    • Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org/.
  • 8
    • 4043168634 scopus 로고    scopus 로고
    • The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer
    • T. W. Arnold and L. P. V. Doorn. The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer. IBM Journal of Research and Development, 48(3/4):475-487, 2004.
    • (2004) IBM Journal of Research and Development , vol.48 , Issue.3-4 , pp. 475-487
    • Arnold, T.W.1    Doorn, L.P.V.2
  • 9
    • 0000940474 scopus 로고    scopus 로고
    • New hybrid fault models for asynchronous approximate agreement
    • M. H. Azmanesh and R. M. Kieckhafer. New hybrid fault models for asynchronous approximate agreement. IEEE Trans. on Computers, 45(4):439-449, 1996.
    • (1996) IEEE Trans. on Computers , vol.45 , Issue.4 , pp. 439-449
    • Azmanesh, M.H.1    Kieckhafer, R.M.2
  • 11
    • 84910156435 scopus 로고    scopus 로고
    • S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proc. of USENIX Security, 2006.
    • S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proc. of USENIX Security, 2006.
  • 12
    • 0001038609 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance. In Proc. of OSDI, 1999.
    • (1999) Proc. of OSDI
    • Castro, M.1    Liskov, B.2
  • 13
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. on Computer Systems, 20(4):398-461, 2002.
    • (2002) ACM Trans. on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 15
    • 0025849585 scopus 로고
    • How to time-stamp a digital document
    • S. Haber and W. S. Stornetta. How to time-stamp a digital document. Journal of Cryptology, 3(2):99-111, 1991.
    • (1991) Journal of Cryptology , vol.3 , Issue.2 , pp. 99-111
    • Haber, S.1    Stornetta, W.S.2
  • 16
    • 58049120018 scopus 로고    scopus 로고
    • PeerReview: Practical accountability for distributed systems
    • A. Haeberlen, P. Kouznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In Proc. of SOSP, 2007.
    • (2007) Proc. of SOSP
    • Haeberlen, A.1    Kouznetsov, P.2    Druschel, P.3
  • 19
    • 38349068551 scopus 로고    scopus 로고
    • Singularity: Rethinking the software stack
    • G. Hunt and J. Larus. Singularity: Rethinking the software stack. Operating Systems Review, 41(2):37-49, 2007.
    • (2007) Operating Systems Review , vol.41 , Issue.2 , pp. 37-49
    • Hunt, G.1    Larus, J.2
  • 20
    • 85033460636 scopus 로고    scopus 로고
    • M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. of USENIX FAST, 2003.
    • M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. of USENIX FAST, 2003.
  • 23
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-565, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 24
  • 27
    • 85094320125 scopus 로고    scopus 로고
    • Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems
    • J. Li and D. Mazières. Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. In Proc. of NSDI, 2007.
    • (2007) Proc. of NSDI
    • Li, J.1    Mazières, D.2
  • 29
    • 0033719035 scopus 로고    scopus 로고
    • An architecture for survivable coordination in large distributed systems
    • D. Malkhi and M. K. Reiter. An architecture for survivable coordination in large distributed systems. IEEE Trans. on Knowledge and Data Engineering, 12(2):187-202, 2000.
    • (2000) IEEE Trans. on Knowledge and Data Engineering , vol.12 , Issue.2 , pp. 187-202
    • Malkhi, D.1    Reiter, M.K.2
  • 30
    • 85084161556 scopus 로고    scopus 로고
    • Secure history preservation through timeline entanglement
    • P. Maniatis and M. Baker. Secure history preservation through timeline entanglement. In Proc. of USENIX Security, 2002.
    • (2002) Proc. of USENIX Security
    • Maniatis, P.1    Baker, M.2
  • 31
    • 85084160699 scopus 로고    scopus 로고
    • L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proc. of USENIX ATC, 1996.
    • L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proc. of USENIX ATC, 1996.
  • 32
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. C. Merkle. A digital signature based on a conventional encryption function. In Proc. of CRYPTO, 1987.
    • (1987) Proc. of CRYPTO
    • Merkle, R.C.1
  • 34
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151-158, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 36
    • 0038562599 scopus 로고    scopus 로고
    • BASE: Using abstraction to improve fault tolerance
    • R. Rodrigues, M. Castro, and B. Liskov. BASE: Using abstraction to improve fault tolerance. In Proc. of SOSP, 2001.
    • (2001) Proc. of SOSP
    • Rodrigues, R.1    Castro, M.2    Liskov, B.3
  • 37
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299-319, 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 38
    • 0024121932 scopus 로고
    • Interactive consistency with multiple failure modes
    • P. Thambidurai and Y.-K. Park. Interactive consistency with multiple failure modes. In Proc. of SRDS, 1988.
    • (1988) Proc. of SRDS
    • Thambidurai, P.1    Park, Y.-K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.