-
1
-
-
41149092147
-
Dynamo: Amazon's highly available key-value store
-
DOI 10.1145/1294261.1294281, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
G. De Candia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, "Dynamo: Amazon's Highly Available Key-Value Store," Proc. 21st ACM Symp. Operating Systems Principles, pp. 205-220, 2007. (Pubitemid 351429377)
-
(2007)
Operating Systems Review (ACM)
, pp. 205-220
-
-
DeCandia, G.1
Hastorun, D.2
Jampani, M.3
Kakulapati, G.4
Lakshman, A.5
Pilchin, A.6
Sivasubramanian, S.7
Vosshall, P.8
Vogels, W.9
-
3
-
-
77953295236
-
-
July
-
Amazon S3 Availability Event, http://status.aws.amazon.com/s3-20080720. html, July 2008.
-
(2008)
Amazon S3 Availability Event
-
-
-
5
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. ACM SIGCOMM, 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
6
-
-
0011800004
-
A secure group membership protocol
-
M. Reiter, "A Secure Group Membership Protocol," IEEE Trans. Software Eng., vol. 22, no. 1, pp. 31-42, Jan. 1996. (Pubitemid 126771656)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 31-42
-
-
Reiter, M.K.1
-
7
-
-
34748899427
-
Fireflies: Scalable support for intrusion-tolerant network overlays
-
DOI 10.1145/1217935.1217937, 1217937, Proceedings of the 2006 EuroSys Conference
-
H. D. Johansen, A. Allavena, and R. van Renesse, "Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays," Proc. European Conf. Computer Systems (EuroSys'06), pp. 3-13, 2006. (Pubitemid 47485734)
-
(2006)
Proceedings of the 2006 EuroSys Conference
, pp. 3-13
-
-
Johansen, H.1
Allavena, A.2
Van Renesse, R.3
-
8
-
-
85077046840
-
Census: Location-aware membership management for large-scale distributed systems
-
June
-
J. Cowling, D. R. K. Ports, B. Liskov, R. A. Popa, and A. Gaikwad, "Census: Location-Aware Membership Management for Large-Scale Distributed Systems," Proc. Ann. Technical Conf. (USENIX'09), June 2009.
-
(2009)
Proc. Ann. Technical Conf. (USENIX'09)
-
-
Cowling, J.1
Ports, D.R.K.2
Liskov, B.3
Popa, R.A.4
Gaikwad, A.5
-
11
-
-
0345757359
-
COCA: A Secure Distributed Online Certification Authority
-
DOI 10.1145/571637.571638
-
L. Zhou, F. B. Schneider, and R. van Renesse, "Coca: A Secure Distributed On-Line Certification Authority," ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002. (Pubitemid 135702589)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
-
13
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme," Proc. Conf. Advances in Crptology (EUROCRYPT'03), pp. 255-271, 2003.
-
(2003)
Proc. Conf. Advances in Crptology (EUROCRYPT'03)
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
14
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
Oct.
-
F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, "Wide-Area Cooperative Storage with CFS," Proc. 18th ACM Symp. Operating Systems Principles (SOSP'01), Oct. 2001.
-
(2001)
Proc. 18th ACM Symp. Operating Systems Principles (SOSP'01)
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
15
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Public Key and Signature Systems," Proc. Fourth ACM Conf. Computer and Comm. Security (CCCS'97), pp. 100-110, 1997.
-
(1997)
Proc. Fourth ACM Conf. Computer and Comm. Security (CCCS'97)
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
16
-
-
0038687710
-
Asynchronous verifiable secret sharing and proactive cryptosystems
-
C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl, "Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems," Proc. Ninth ACM Conf. Computer and Comm. Security, pp. 88-97, 2002.
-
(2002)
Proc. Ninth ACM Conf. Computer and Comm. Security
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
17
-
-
84962773855
-
Verifiable secret redistribution for archive systems
-
T. M. Wong, C. Wang, and J. M. Wing, "Verifiable Secret Redistribution for Archive Systems," Proc. First Int'l IEEE Security in Storage Workshop, pp. 94-105, 2002.
-
(2002)
Proc. First Int'l IEEE Security in Storage Workshop
, pp. 94-105
-
-
Wong, T.M.1
Wang, C.2
Wing, J.M.3
-
20
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the WWW
-
May
-
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin, "Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the WWW," Proc. 29th Ann. ACM Symp. Theory of Computing (STOC'97), pp. 654-663, May 1997.
-
(1997)
Proc. 29th Ann. ACM Symp. Theory of Computing (STOC'97)
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
21
-
-
33846266416
-
-
PhD dissertation, Massachusetts Inst. of Technology, Feb.
-
R. Rodrigues, "Robust Services in Dynamic Systems," PhD dissertation, Massachusetts Inst. of Technology, Feb. 2005.
-
(2005)
Robust Services in Dynamic Systems
-
-
Rodrigues, R.1
-
22
-
-
84957086893
-
How to forget a secret
-
Mar.
-
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, "How to Forget a Secret," Proc. 16th Ann. Symp. Theoretical Aspects of Computer Science (STACS'99), pp. 500-509, Mar. 1999.
-
(1999)
Proc. 16th Ann. Symp. Theoretical Aspects of Computer Science (STACS'99)
, pp. 500-509
-
-
Di Crescenzo, G.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
24
-
-
85026654819
-
Making byzantine fault tolerant systems tolerate byzantine faults
-
Apr.
-
A. Clement, M. Marchetti, E. Wong, L. Alvisi, and M. Dahlin, "Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults," Proc. Sixth USENIX Symp. Networked Systems Design and Implementation (NSDI'09), Apr. 2009.
-
(2009)
Proc. Sixth USENIX Symp. Networked Systems Design and Implementation (NSDI'09)
-
-
Clement, A.1
Marchetti, M.2
Wong, E.3
Alvisi, L.4
Dahlin, M.5
-
26
-
-
84863017118
-
A correctness proof for a byzantine-fault-tolerant read/write atomic memory with dynamic replica membership
-
Sept.
-
R. Rodrigues and B. Liskov, "A Correctness Proof for a Byzantine-Fault-Tolerant Read/Write Atomic Memory with Dynamic Replica Membership," MIT LCS TR/920, Sept. 2003.
-
(2003)
MIT LCS TR/920
-
-
Rodrigues, R.1
Liskov, B.2
-
28
-
-
84978427421
-
Ivy: A read/write peer-to-peer file system
-
Dec.
-
A. Muthitacharoen, R. Morris, T. Gil, and B. Chen, "Ivy: A Read/Write Peer-to-Peer File System," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI'02), Dec. 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI'02)
-
-
Muthitacharoen, A.1
Morris, R.2
Gil, T.3
Chen, B.4
-
30
-
-
0029700755
-
On the impossibility of group membership
-
T. D. Chandra, V. Hadzilacos, S. Toueg, and B. Charron-Bost, "On the Impossibility of Group Membership," Proc. 15th Ann. ACM Symp. Principles of Distributed Computing (PODC'96), pp. 322-330, 1996.
-
(1996)
Proc. 15th Ann. ACM Symp. Principles of Distributed Computing (PODC'96)
, pp. 322-330
-
-
Chandra, T.D.1
Hadzilacos, V.2
Toueg, S.3
Charron-Bost, B.4
-
37
-
-
0035101070
-
The generic consensus service
-
R. Guerraoui and A. Schiper, "The Generic Consensus Service," IEEE Trans. Software Eng., vol. 27, no. 1, pp. 29-41, Jan. 2001. (Pubitemid 33775747)
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.1
, pp. 29-41
-
-
Guerraoui, R.1
Schiper, A.2
-
38
-
-
2442603590
-
Security for structured peer-to-peer overlay networks
-
Dec.
-
M. Castro, P. Druschell, A. Ganesh, A. Rowstron, and D. Wallach, "Security for Structured Peer-to-Peer Overlay Networks," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI'02), Dec. 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI'02)
-
-
Castro, M.1
Druschell, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
40
-
-
34748867151
-
The SMART way to migrate replicated stateful services
-
DOI 10.1145/1217935.1217946, 1217946, Proceedings of the 2006 EuroSys Conference
-
J. R. Lorch, A. Adya, W. J. Bolosky, R. Chaiken, J. R. Douceur, and J. Howell, "The Smart Way to Migrate Replicated Stateful Services," Proc. European Conf. Computer Systems (EuroSys'06), pp. 103-115, 2006. (Pubitemid 47485741)
-
(2006)
Proceedings of the 2006 EuroSys Conference
, pp. 103-115
-
-
Lorch, J.R.1
Adya, A.2
Bolosky, W.J.3
Chaiken, R.4
Douceur, J.R.5
Howell, J.6
-
41
-
-
0034590169
-
Dynamic byzantine quorum systems
-
June
-
L. Alvisi, D. Malkhi, E. Pierce, M. Reiter, and R. Wright, "Dynamic Byzantine Quorum Systems," Proc. Int'l Conf. Dependable Systems and Networks (DSN'00), pp. 283-292, June 2000.
-
(2000)
Proc. Int'l Conf. Dependable Systems and Networks (DSN'00)
, pp. 283-292
-
-
Alvisi, L.1
Malkhi, D.2
Pierce, E.3
Reiter, M.4
Wright, R.5
-
42
-
-
27644582892
-
A reconfigurable byzantine quorum approach for the agile store
-
Oct.
-
L. Kong, A. Subbiah, M. Ahamad, and D. M. Blough, "A Reconfigurable Byzantine Quorum Approach for the Agile Store," Proc. 22nd IEEE Symp. Reliable Distributed Systems, Oct. 2003.
-
(2003)
Proc. 22nd IEEE Symp. Reliable Distributed Systems
-
-
Kong, L.1
Subbiah, A.2
Ahamad, M.3
Blough, D.M.4
-
45
-
-
34548045072
-
Antiquity: Exploiting a secure log for wide-area distributed storage
-
DOI 10.1145/1272996.1273035, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
-
H. Weatherspoon, P. R. Eaton, B.-G. Chun, and J. Kubiatowicz, "Antiquity: Exploiting a Secure Log for Wide-Area Distributed Storage," Proc. European Conf. Computer Systems (EuroSys'07), pp. 371-384, 2007. (Pubitemid 47281596)
-
(2007)
Operating Systems Review (ACM)
, pp. 371-384
-
-
Weatherspoon, H.1
Eaton, P.2
Chun, B.-G.3
Kubiatowicz, J.4
-
46
-
-
0034440650
-
OceanStore: An architecture for global-scale persistent storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, C. Wells, and B. Zhao, "Oceanstore: An Architecture for Global-Scale Persistent Storage," Proc. Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pp. 190-201, 2000. (Pubitemid 32470898)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
47
-
-
84943547553
-
Pond: The oceanstore prototype
-
Mar.
-
S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz, "Pond: The Oceanstore Prototype," Proc. Second USENIX Conf. File and Storage Technologies (FAST'03), Mar. 2003.
-
(2003)
Proc. Second USENIX Conf. File and Storage Technologies (FAST'03)
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
48
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
Dec.
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer, "Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI'02), Dec. 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI'02)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
|