메뉴 건너뛰기




Volumn 53, Issue 13, 2009, Pages 2340-2359

Brahms: Byzantine resilient random membership sampling

Author keywords

Byzantine faults; Gossip; Membership; Random sampling

Indexed keywords

BYZANTINE FAULTS; DYNAMIC SYSTEMS; GOSSIP; GOSSIP PROTOCOLS; HIGH PROBABILITY; LINEAR PORTIONS; MALICIOUS BEHAVIOR; MEMBERSHIP; MEMBERSHIP PROTOCOLS; RANDOM SAMPLING; RIGOROUS ANALYSIS; THEORETICAL MODELS; TWO-COMPONENT;

EID: 67650523874     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.03.008     Document Type: Article
Times cited : (64)

References (44)
  • 1
    • 32344451942 scopus 로고    scopus 로고
    • Correctness of a gossip based membership protocol
    • A. Allavena, A. Demers, J.E. Hopcroft, Correctness of a gossip based membership protocol, in: ACM PODC, 2005, pp. 292-301.
    • (2005) ACM PODC , pp. 292-301
    • Allavena, A.1    Demers, A.2    Hopcroft, J.E.3
  • 4
    • 35048895724 scopus 로고    scopus 로고
    • B. Awerbuch, C. Scheideler, Group spreading: a protocol for provably secure distributed name service, in: ICALP, 2004, pp. 183-195.
    • B. Awerbuch, C. Scheideler, Group spreading: a protocol for provably secure distributed name service, in: ICALP, 2004, pp. 183-195.
  • 5
    • 84885718443 scopus 로고    scopus 로고
    • B. Awerbuch, C. Scheideler, Robust random number generation for peer-to-peer systems, in: OPODIS, 2006, pp. 275-289.
    • B. Awerbuch, C. Scheideler, Robust random number generation for peer-to-peer systems, in: OPODIS, 2006, pp. 275-289.
  • 7
    • 67650522021 scopus 로고    scopus 로고
    • B. Awerbuch, C. Scheideler, Towards scalable and robust overlay networks, in: IPTPS, 2006.
    • B. Awerbuch, C. Scheideler, Towards scalable and robust overlay networks, in: IPTPS, 2006.
  • 9
    • 67650525253 scopus 로고    scopus 로고
    • G. Badishi, I. Keidar, A. Sasson, Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast, in: DSN, June-July 2004, pp. 201-210.
    • G. Badishi, I. Keidar, A. Sasson, Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast, in: DSN, June-July 2004, pp. 201-210.
  • 10
    • 33748084385 scopus 로고    scopus 로고
    • RaWMS - random walk based lightweight membership service for wireless ad hoc networks
    • Z. Bar-Yossef, R. Friedman, G. Kliot, RaWMS - random walk based lightweight membership service for wireless ad hoc networks, in: ACM MobiHoc, 2006, pp. 238-249.
    • (2006) ACM MobiHoc , pp. 238-249
    • Bar-Yossef, Z.1    Friedman, R.2    Kliot, G.3
  • 11
    • 34250665891 scopus 로고    scopus 로고
    • Z. Bar-Yossef, M. Gurevich, Random sampling from a search engine's index, in: Proc. of 15th WWW, 2006, pp. 367-376, Full version available as CCIT Report #598, Department of Electrical Engineering, Technion.
    • Z. Bar-Yossef, M. Gurevich, Random sampling from a search engine's index, in: Proc. of 15th WWW, 2006, pp. 367-376, Full version available as CCIT Report #598, Department of Electrical Engineering, Technion.
  • 17
    • 0036767270 scopus 로고    scopus 로고
    • Maintaining Stream Statistics over Sliding Windows
    • Datar M., Gionis A., Indyk P., and Motwani R. Maintaining Stream Statistics over Sliding Windows. SIAM J. Comput. 31 6 (2002) 1794-1813
    • (2002) SIAM J. Comput. , vol.31 , Issue.6 , pp. 1794-1813
    • Datar, M.1    Gionis, A.2    Indyk, P.3    Motwani, R.4
  • 18
    • 85030178366 scopus 로고    scopus 로고
    • A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, D. Terry. epidemic algorithms for replicated database management, in: ACM PODC, August 1987, pp. 1-12.
    • A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, D. Terry. epidemic algorithms for replicated database management, in: ACM PODC, August 1987, pp. 1-12.
  • 22
    • 0037330403 scopus 로고    scopus 로고
    • Peer-to-Peer membership management for gossip-based protocols
    • Ganesh A.J., Kermarrec A.-M., and Massoulie L. Peer-to-Peer membership management for gossip-based protocols. IEEE Trans. Comput. 52 2 (2003) 139-149
    • (2003) IEEE Trans. Comput. , vol.52 , Issue.2 , pp. 139-149
    • Ganesh, A.J.1    Kermarrec, A.-M.2    Massoulie, L.3
  • 23
    • 8344250202 scopus 로고    scopus 로고
    • C. Gkantsidis, M. Mihail, A. Saberi, Random walks in peer-to-peer networks, in: IEEE INFOCOM, 2004, pp. 130-140.
    • C. Gkantsidis, M. Mihail, A. Saberi, Random walks in peer-to-peer networks, in: IEEE INFOCOM, 2004, pp. 130-140.
  • 24
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich O., Goldwasser S., and Micali S. How to construct random functions. JACM 33 4 (1986) 792-807
    • (1986) JACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 25
    • 0041964688 scopus 로고
    • A generalization of Krasnoselski's theorem on the real line
    • Hillam B.P. A generalization of Krasnoselski's theorem on the real line. Math. Mag. 48 (1975) 167-168
    • (1975) Math. Mag. , vol.48 , pp. 167-168
    • Hillam, B.P.1
  • 29
    • 0030704545 scopus 로고    scopus 로고
    • Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
    • D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web, in: Proc. of the ACM STOC, 1997, pp. 654-663.
    • (1997) Proc. of the ACM STOC , pp. 654-663
    • Karger, D.1    Lehman, E.2    Leighton, T.3    Levine, M.4    Lewin, D.5    Panigrahy, R.6
  • 31
    • 10444222507 scopus 로고    scopus 로고
    • Choosing a random peer
    • V. King, J. Saia, Choosing a random peer, in: ACM PODC, 2004, pp. 125-130.
    • (2004) ACM PODC , pp. 125-130
    • King, V.1    Saia, J.2
  • 32
    • 0041472348 scopus 로고    scopus 로고
    • C. Law, K. Siu, Distributed construction of random expander networks, in: IEEE INFOCOM, April 2003, pp. 2133-2143.
    • C. Law, K. Siu, Distributed construction of random expander networks, in: IEEE INFOCOM, April 2003, pp. 2133-2143.
  • 33
    • 85043380426 scopus 로고    scopus 로고
    • H.C. Li, A. Clement, E.L. Wong, J. Napper, I. Roy, L. Alvisi, M. Dahlin, BAR gossip, in: Proc. of the Seventh USENIX Symp. on Oper. Systems Design and Impl. (OSDI), November 2006, pp. 45-58.
    • H.C. Li, A. Clement, E.L. Wong, J. Napper, I. Roy, L. Alvisi, M. Dahlin, BAR gossip, in: Proc. of the Seventh USENIX Symp. on Oper. Systems Design and Impl. (OSDI), November 2006, pp. 45-58.
  • 36
    • 33748700606 scopus 로고    scopus 로고
    • Peer counting and sampling in overlay networks: Random walk methods
    • L. Massoulie, E. Le Merrer, A.-M. Kermarrec, A.J. Ganesh, Peer counting and sampling in overlay networks: random walk methods, in: ACM PODC, 2006, pp. 123-132.
    • (2006) ACM PODC , pp. 123-132
    • Massoulie, L.1    Le Merrer, E.2    Kermarrec, A.-M.3    Ganesh, A.J.4
  • 37
    • 18844460674 scopus 로고    scopus 로고
    • R. Melamed, I. Keidar, Araneola: a scalable reliable multicast system for dynamic environments, in: IEEE NCA, 2004, pp. 5-14.
    • R. Melamed, I. Keidar, Araneola: a scalable reliable multicast system for dynamic environments, in: IEEE NCA, 2004, pp. 5-14.
  • 38
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • Merkle R.C. Secure communications over insecure channels. CACM 21 (1978) 294-299
    • (1978) CACM , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 39
    • 0037303962 scopus 로고    scopus 로고
    • Tolerating malicious gossip
    • Minsky Y.M., and Schneider F.B. Tolerating malicious gossip. Dist. Comput. 16 1 (2003) 49-68
    • (2003) Dist. Comput. , vol.16 , Issue.1 , pp. 49-68
    • Minsky, Y.M.1    Schneider, F.B.2
  • 41
    • 34547492967 scopus 로고    scopus 로고
    • A. Singh, T.-W. Ngan, P. Druschel, D.S. Wallach, Eclipse attacks on overlay networks: threats and defenses, in: IEEE INFOCOM, 2006.
    • A. Singh, T.-W. Ngan, P. Druschel, D.S. Wallach, Eclipse attacks on overlay networks: threats and defenses, in: IEEE INFOCOM, 2006.
  • 42
    • 0022026217 scopus 로고
    • Random sampling with a reservoir
    • Vitter J.S. Random sampling with a reservoir. ACM Trans. Math. Softw. 11 1 (1985) 37-57
    • (1985) ACM Trans. Math. Softw. , vol.11 , Issue.1 , pp. 37-57
    • Vitter, J.S.1
  • 43
    • 22044433190 scopus 로고    scopus 로고
    • CYCLON: inexpensive membership management for unstructured P2P overlays
    • Voulgaris S., Gavidia D., and van Steen M. CYCLON: inexpensive membership management for unstructured P2P overlays. J. Netw. Syst. Manage. 13 2 (2005) 197-217
    • (2005) J. Netw. Syst. Manage. , vol.13 , Issue.2 , pp. 197-217
    • Voulgaris, S.1    Gavidia, D.2    van Steen, M.3
  • 44
    • 45749109010 scopus 로고    scopus 로고
    • SybilGuard: defending against Sybil attacks via social networks
    • Yu H., Kaminsky M., Gibbons P.B., and Flaxman A. SybilGuard: defending against Sybil attacks via social networks. IEEE/ACM Trans. Netw. (ToN) 16 3 (2008) 576-589
    • (2008) IEEE/ACM Trans. Netw. (ToN) , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.