-
2
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov, "Practical Byzantine fault-tolerance and proactive recovery," ACM TOCS, vol. 20, no. 4, pp. 398- 461, 2002. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
3
-
-
41149091269
-
Zyzzyva: Speculative byzantine fault tolerance
-
Oct.
-
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong, "Zyzzyva: Speculative Byzantine fault tolerance," in Proc. of the 21st ACM Symp. on Operating Systems Principles (SOSP'07), Oct. 2007.
-
(2007)
Proc. of the 21st ACM Symp. on Operating Systems Principles (SOSP'07)
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
4
-
-
80051526094
-
A comparison of intrusion-tolerant system architectures
-
Mar./Apr.
-
Q. Nguyen and A. Sood, "A comparison of intrusion-tolerant system architectures," IEEE Security & Privacy, vol. 9, no. 2, pp. 18-25, Mar./Apr. 2003.
-
(2003)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 18-25
-
-
Nguyen, Q.1
Sood, A.2
-
5
-
-
21644446595
-
Separating agreement form execution for Byzantine fault tolerant services
-
Oct.
-
J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin, "Separating agreement form execution for Byzantine fault tolerant services," in Proc. of the 19th ACM Symp. on Operating Systems Principles - SOSP'03, Oct. 2003.
-
(2003)
Proc. of the 19th ACM Symp. on Operating Systems Principles - SOSP'03
-
-
Yin, J.1
Martin, J.-P.2
Venkataramani, A.3
Alvisi, L.4
Dahlin, M.5
-
6
-
-
79955961285
-
ZZ and the art of practical BFT execution
-
Apr.
-
T. Wood, R. Singh, A. Venkataramani, P. Shenoy, and E. Cecchet, "ZZ and the art of practical BFT execution," in Proceedings of the 6th ACM SIGOPS/EuroSys European SystemsConference - EuroSys'11, Apr. 2011.
-
(2011)
Proceedings of the 6th ACM SIGOPS/EuroSys European SystemsConference - EuroSys'11
-
-
Wood, T.1
Singh, R.2
Venkataramani, A.3
Shenoy, P.4
Cecchet, E.5
-
8
-
-
16244410458
-
How to tolerate half less one byzantine nodes in practical distributed systems
-
Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2004
-
M. Correia, N. F. Neves, and P. Veríssimo, "How to tolerate half less one Byzantine nodes in practical distributed systems," in Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems, Oct. 2004, pp. 174-183. (Pubitemid 40449363)
-
(2004)
Proceedings of the IEEE Symposium on Reliable Distributed Systems
, pp. 174-183
-
-
Correia, M.1
Neves, N.F.2
Verissimo, P.3
-
9
-
-
41149157410
-
Attested append-only memory: Making adversaries stick to their word
-
Oct.
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz, "Attested append-only memory: Making adversaries stick to their word," in Proc. of the 21st ACM Symp. on Operating Systems Principles (SOSP'07), Oct. 2007.
-
(2007)
Proc. of the 21st ACM Symp. on Operating Systems Principles (SOSP'07)
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
10
-
-
79951931157
-
-
Department of Computer Science, University of Lisbon, DI/FCUL TR 09-15, Jun. [Online]
-
G. S. Veronese, M. Correia, A. Bessani, L. Chung, and P. Verissimo, "Minimal Byzantine fault tolerance: Algorithm and evaluation," Department of Computer Science, University of Lisbon, DI/FCUL TR 09-15, Jun. 2009. [Online]. Available: http://hdl.handle.net/10455/3153
-
(2009)
Minimal Byzantine Fault Tolerance: Algorithm and Evaluation
-
-
Veronese, G.S.1
Correia, M.2
Bessani, A.3
Chung, L.4
Verissimo, P.5
-
11
-
-
0345757359
-
COCA: A Secure Distributed Online Certification Authority
-
DOI 10.1145/571637.571638
-
L. Zhou, F. Schneider, and R. Van Rennesse, "COCA: A secure distributed online certification authority," ACM TOCS, vol. 20, no. 4, pp. 329-368, Nov. 2002. (Pubitemid 135702589)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
-
14
-
-
77649269780
-
Highly available intrusion-tolerant services with proactive-reactive recovery
-
P. Sousa, A. N. Bessani, M. Correia, N. F. Neves, and P. Verissimo, "Highly available intrusion-tolerant services with proactive-reactive recovery," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 452-465, 2010.
-
(2010)
IEEE Transactions on Parallel and Distributed Systems
, vol.21
, Issue.4
, pp. 452-465
-
-
Sousa, P.1
Bessani, A.N.2
Correia, M.3
Neves, N.F.4
Verissimo, P.5
-
15
-
-
0017792448
-
On the implementation of Nversion programming for software fault tolerance during execution
-
Chicago, IL, USA, Nov.
-
A. Avizienis and L. Chen, "On the implementation of Nversion programming for software fault tolerance during execution," in Proceedings of the IEEE COMPSAC, Chicago, IL, USA, Nov. 1977, pp. 149-155.
-
(1977)
Proceedings of the IEEE COMPSAC
, pp. 149-155
-
-
Avizienis, A.1
Chen, L.2
-
16
-
-
80051939470
-
OS diversity for intrusion tolerance: Myth or reality?
-
Hong Kong
-
M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro, "OS diversity for intrusion tolerance: Myth or reality?" in Proc. of the Int. Conf. on Dependable Systems and Networks (DSN'11), Hong Kong, 2011.
-
(2011)
Proc. of the Int. Conf. on Dependable Systems and Networks (DSN'11)
-
-
Garcia, M.1
Bessani, A.2
Gashi, I.3
Neves, N.4
Obelheiro, R.5
-
17
-
-
36248952641
-
Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers
-
DOI 10.1109/TDSC.2007.70208
-
I. Gashi, P. Popov, and L. Strigini, "Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 280-294, Oct-Dec 2007. (Pubitemid 350125894)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 280-294
-
-
Gashi, I.1
Popov, P.2
Strigini, L.3
-
18
-
-
85026654819
-
Making Byzantine fault tolerant systems tolerate Byzantine faults
-
Apr.
-
A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti, "Making Byzantine fault tolerant systems tolerate Byzantine faults," in Proceedings of the 6th USENIX Symposium on Networked Systems Design & Implementation, Apr. 2009.
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design & Implementation
-
-
Clement, A.1
Wong, E.2
Alvisi, L.3
Dahlin, M.4
Marchetti, M.5
-
19
-
-
53349144471
-
Byzantine replication under attack
-
Jun.
-
Y. Amir, B. Coan, J. Kirsch, and J. Lane, "Byzantine replication under attack," in Proceedings of the IEEE International Conference on Dependable Systems and Networks, Jun. 2008.
-
(2008)
Proceedings of the IEEE International Conference on Dependable Systems and Networks
-
-
Amir, Y.1
Coan, B.2
Kirsch, J.3
Lane, J.4
-
23
-
-
2442619381
-
BASE: Using abstraction to improve fault tolerance
-
Aug.
-
M. Castro, R. Rodrigues, and B. Liskov, "BASE: Using abstraction to improve fault tolerance," ACM Transactions Computer Systems, vol. 21, no. 3, pp. 236-269, Aug. 2003.
-
(2003)
ACM Transactions Computer Systems
, vol.21
, Issue.3
, pp. 236-269
-
-
Castro, M.1
Rodrigues, R.2
Liskov, B.3
-
24
-
-
57749193316
-
DepSpace: A Byzantine fault-tolerant coordination service
-
Apr.
-
A. N. Bessani, E. P. Alchieri, M. Correia, and J. S. Fraga, "DepSpace: a Byzantine fault-tolerant coordination service," in Proceedings of the 3rd ACM SIGOPS/EuroSys European Systems Conference - EuroSys'08, Apr. 2008.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Systems Conference - EuroSys'08
-
-
Bessani, A.N.1
Alchieri, E.P.2
Correia, M.3
Fraga, J.S.4
-
25
-
-
12344279229
-
CODEX: A robust and secure secret distribution system
-
DOI 10.1109/TDSC.2004.3
-
M. A. Marsh and F. B. Schneider, "CODEX: A robust and secure secret distribution system," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 34-47, Jan.-Mar. 2004. (Pubitemid 40134577)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 34-47
-
-
Marsh, M.A.1
Schneider, F.B.2
-
26
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
March
-
C. Gentry, "Computing arbitrary functions of encrypted data," Communications of the ACM, vol. 53, pp. 97-105, March 2010.
-
(2010)
Communications of the ACM
, vol.53
, pp. 97-105
-
-
Gentry, C.1
|