-
2
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R.P. Wattenhofer, "Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment, " Proc. Fifth Symp. Operating Systems Design and Implementation, pp. 1-14, 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
3
-
-
84885635827
-
BAR Fault tolerance for cooperative services
-
Oct
-
A.S. Aiyer, L. Alvisi, A. Clement, M. Dahlin, J. Martin, and C. Porth, "BAR Fault Tolerance for Cooperative Services, " Proc. 20th ACM Symp. Operating Systems Principles, Oct. 2005.
-
(2005)
Proc. 20th ACM Symp. Operating Systems Principles
-
-
Aiyer, A.S.1
Alvisi, L.2
Clement, A.3
Dahlin, M.4
Martin, J.5
Porth, C.6
-
4
-
-
33845592189
-
Scaling Byzantine fault-tolerant replication to wide area networks
-
DOI 10.1109/DSN.2006.63, 1633500, Proceedings - DSN 2006: 2006 International Conference on Dependable Systems and Networks
-
Y. Amir, C. Danilov, D. Dolev, J. Kirsch, J. Lane, C. Nita-Rotaru, J. Olsen, and D. Zage, "Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks, " Proc. IEEE Int'l Conf. Dependable Systems and Networks, pp. 105-114, June 2006. (Pubitemid 44930412)
-
(2006)
Proceedings of the International Conference on Dependable Systems and Networks
, vol.2006
, pp. 105-114
-
-
Amir, Y.1
Danilov, C.2
Dolev, D.3
Kirsch, J.4
Lane, J.5
Nita-Rotaru, C.6
Olsen, J.7
Zage, D.8
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
P. Barham, B. Dragovic, K. Fraiser, S. Hand, T. Harris, A. Ho, R. Neugebaurer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization, " Proc. 19th ACM Symp. Operating Systems Principles, pp. 164-177, Oct. 2003. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
E.G. Barrantes, D.H. Ackley, T.S. Palmer, D. Stefanovic, and D.D. Zovi, "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks, " Proc. 10th ACM Conf. Computer and Comm. Security, pp. 281-289, 2003. (Pubitemid 40673810)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Palmer, T.S.2
Ackley, D.H.3
Stefanovic, D.4
Forrest, S.5
Zovi, D.D.6
-
7
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
Aug
-
S. Berger, R. Cáceres, K.A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vTPM: Virtualizing the Trusted Platform Module, " Proc. 15th USENIX Security Symp., pp. 305-320, Aug. 2006.
-
(2006)
Proc. 15th USENIX Security Symp
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
8
-
-
57749193316
-
DepSpace: A byzantine fault-tolerant coordination service
-
Apr
-
A.N. Bessani, E.P. Alchieri, M. Correia, and J.S. Fraga, "DepSpace: A Byzantine Fault-Tolerant Coordination Service, " Proc. Third ACM SIGOPS/EuroSys European Systems Conf., Apr. 2008.
-
(2008)
Proc. Third ACM SIGOPS/EuroSys European Systems Conf.
-
-
Bessani, A.N.1
Alchieri, E.P.2
Correia, M.3
Fraga, J.S.4
-
10
-
-
84870532535
-
How hardware-based security protects PCs
-
Feb
-
M. Branscombe, "How Hardware-Based Security Protects PCs, " Tom's Hardware, http://www.tomshardware.com/reviews/hardware-based-security- protects-pcs, 1771.html, Feb. 2008.
-
(2008)
Tom's Hardware
-
-
Branscombe, M.1
-
12
-
-
0345757358
-
Practical byzantine fault tolerance and proactive recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance and Proactive Recovery, " ACM Trans. Computer Systems, vol. 20, no. 4, pp. 398-461, Nov. 2002. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
13
-
-
41149157410
-
Attested append-only memory: Making adversaries stick to their word
-
Oct
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz, "Attested Append-Only Memory: Making Adversaries Stick to Their Word, " Proc. 21st ACM Symp. Operating Systems Principles, Oct. 2007.
-
(2007)
Proc. 21st ACM Symp. Operating Systems Principles
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
14
-
-
72249084310
-
Upright cluster services
-
A. Clement, M. Kapritsos, S. Lee, Y. Wang, L. Alvisi, M. Dahlin, and T. Riche, "Upright Cluster Services, " Proc. ACM SIGOPS 22nd Symp. Operating Systems Principles, pp. 277-290, 2009.
-
(2009)
Proc ACM SIGOPS 22nd Symp. Operating Systems Principles
, pp. 277-290
-
-
Clement, A.1
Kapritsos, M.2
Lee, S.3
Wang, Y.4
Alvisi, L.5
Dahlin, M.6
Riche, T.7
-
15
-
-
16244410458
-
How to tolerate half less one byzantine nodes in practical distributed systems
-
Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2004
-
M. Correia, N.F. Neves, and P. Verissimo, "How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems, " Proc. 23rd IEEE Symp. Reliable Distributed Systems, pp. 174-183, Oct. 2004. (Pubitemid 40449363)
-
(2004)
Proceedings of the IEEE Symposium on Reliable Distributed Systems
, pp. 174-183
-
-
Correia, M.1
Neves, N.F.2
Verissimo, P.3
-
16
-
-
84937580904
-
The design of a cots real-time distributed security kernel
-
Oct
-
M. Correia, P. Verissimo, and N.F. Neves, "The Design of a COTS Real-Time Distributed Security Kernel, " Proc. Fourth European Dependable Computing Conf., pp. 234-252, Oct. 2002.
-
(2002)
Proc. Fourth European Dependable Computing Conf
, pp. 234-252
-
-
Correia, M.1
Verissimo, P.2
Neves, N.F.3
-
17
-
-
85009705400
-
HQReplication: A hybrid quorum protocol for byzantine fault tolerance
-
Nov
-
J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira, "HQReplication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance, " Proc. Seventh Symp. Operating Systems Design and Implementations, pp. 177-190, Nov. 2006.
-
(2006)
Proc. Seventh Symp. Operating Systems Design and Implementations
, pp. 177-190
-
-
Cowling, J.1
Myers, D.2
Liskov, B.3
Rodrigues, R.4
Shrira, L.5
-
18
-
-
0023994903
-
Consensus in the presence of partial synchrony
-
Apr
-
C. Dwork, N. Lynch, and L. Stockmeyer, "Consensus in the Presence of Partial Synchrony, " J. ACM, vol. 35, no. 2, pp. 288-323, Apr. 1988.
-
(1988)
J ACM
, vol.35
, Issue.2
, pp. 288-323
-
-
Dwork, C.1
Lynch, N.2
Stockmeyer, L.3
-
20
-
-
80051939470
-
OS Diversity for intrusion tolerance: Myth or reality
-
June
-
M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro, "OS Diversity for Intrusion Tolerance: Myth or Reality, " Proc. Int'l Conf. Dependable Systems and Networks, June 2011.
-
(2011)
Proc. Int'l Conf. Dependable Systems and Networks
-
-
Garcia, M.1
Bessani, A.2
Gashi, I.3
Neves, N.4
Obelheiro, R.5
-
21
-
-
79955968568
-
Efficient middleware for byzantine fault-tolerant database replication
-
Apr
-
R. Garcia, R. Rodrigues, and N. Preguiça, "Efficient Middleware for Byzantine Fault-Tolerant Database Replication, " Proc. Sixth ACM SIGOPS/EuroSys European Conf. Computer Systems, pp. 107-122, Apr. 2011.
-
(2011)
Proc. SixthACM SIGOPS/EuroSys European Conf. Computer Systems
, pp. 107-122
-
-
Garcia, R.1
Rodrigues, R.2
Preguiça, N.3
-
22
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A Virtual Machine-Based Platform for Trusted Computing, " Proc. 19th ACM Symp. Operating Systems Principles, pp. 193-206, 2003. (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
24
-
-
84870548840
-
Lagrande technology preliminary architecture specification
-
Intel Corporation May
-
Intel Corporation, "LaGrande Technology Preliminary Architecture Specification, " Intel Publication D52212, May 2006.
-
(2006)
Intel Publication D52212
-
-
-
26
-
-
70450015331
-
Zyzzyva: Speculative byzantine fault tolerance
-
Oct
-
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong, "Zyzzyva: Speculative Byzantine Fault Tolerance, " Proc. 21st Symp. Operating Systems Principles, Oct. 2007.
-
(2007)
Proc. 21st Symp. Operating Systems Principles
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
28
-
-
84976699318
-
The byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem, " ACM Trans. Programming Languages and Systems, vol. 4, no. 3, pp. 382-401, July 1982.
-
(1982)
ACM Trans. Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
30
-
-
33748100383
-
Fast Byzantine consensus
-
DOI 10.1109/TDSC.2006.35, 1673380
-
J.P. Martin and L. Alvisi, "Fast Byzantine Consensus, " IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 202-215, July-Sept. 2006. (Pubitemid 44304208)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.3
, pp. 202-215
-
-
Martin, J.-P.1
Alvisi, L.2
-
31
-
-
84947286466
-
Minimal byzantine storage
-
Oct
-
J.P. Martin, L. Alvisi, and M. Dahlin, "Minimal Byzantine Storage, " Proc. 16th Int'l Conf. Distributed Computing, pp. 311-325, Oct. 2002.
-
(2002)
Proc. 16th Int'l Conf. Distributed Computing
, pp. 311-325
-
-
Martin, J.P.1
Alvisi, L.2
Dahlin, M.3
-
32
-
-
77957778583
-
How low can you go?: Recommendations for hardware-supported minimal TCB code execution
-
DOI 10.1145/1346281.1346285, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, and A. Seshadri, "How Low Can You Go Recommendations for Hardware-Supported Minimal TCB Code Execution, " Proc. 13th Int'l Conf. Architectural Support for Programming Languages and Operating Systems, pp. 14-25, Mar. 2008. (Pubitemid 351585390)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 14-25
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
33
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
Apr
-
J.M. McCune, B.J. Parno, A.P.M.K. Reiter, and H. Isozaki, "Flicker: An Execution Infrastructure for TCB Minimization, " Proc. Third ACM SIGOPS/EuroSys European Systems Conf., Apr. 2008.
-
(2008)
Proc. Third ACM SIGOPS/EuroSys European Systems Conf.
-
-
McCune, J.M.1
Parno, B.J.2
Reiter, A.P.M.K.3
Isozaki, H.4
-
34
-
-
74949106161
-
How practical are intrusion-tolerant distributed systems?
-
Sept
-
R.R. Obelheiro, A.N. Bessani, L.C. Lung, and M. Correia, "How Practical Are Intrusion-Tolerant Distributed Systems?" DI-FCUL TR 06-15, Dept. of Informatics, Univ. of Lisbon, Sept. 2006.
-
(2006)
DI-FCUL TR06-15, Dept. of Informatics, Univ. of Lisbon
-
-
Obelheiro, R.R.1
Bessani, A.N.2
Lung, L.C.3
Correia, M.4
-
35
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Apr
-
M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults, " J. ACM, vol. 27, no. 2, pp. 228-234, Apr. 1980.
-
(1980)
J ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
36
-
-
84870496187
-
-
Trusted Computing Group Specification Version 1.2, Revision July
-
Trusted Computing Group, "TPM Main, Part 1, Design Principles, " Specification Version 1.2, Revision 103, July 2007.
-
(2007)
TPM Main, Part 1, Design Principles
, vol.103
-
-
-
37
-
-
84870566526
-
TPM main, part 3 commands
-
Trusted Computing Group July
-
Trusted Computing Group, "TPM Main, Part 3 Commands, " Specification Version 1.2, Revision 103, July 2007.
-
(2007)
Specification Version 1.2, Revision
, vol.103
-
-
-
40
-
-
0029701328
-
The-key management service
-
M.K. Reiter, M.K. Franklin, J.B. Lacy, and R.N. Wright, "The-Key Management Service, " Proc. Third ACM Conf. Computer and Comm. Security, pp. 38-47, 1996.
-
(1996)
Proc. Third ACM Conf. Computer and Comm. Security
, pp. 38-47
-
-
Reiter, M.K.1
Franklin, M.K.2
Lacy, J.B.3
Wright, R.N.4
-
41
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
DOI 10.1145/1179474.1179485, Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
L.F.G. Sarmenta, M. van Dijk, C.W. O'Donnell, J. Rhodes, and S. Devadas, "Virtual Monotonic Counters and Count-Limited Objects Using a TPM without a Trusted OS, " Proc. First ACM Workshop Scalable Trusted Computing, pp. 27-42, Nov. 2006. (Pubitemid 47117274)
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 27-42
-
-
Sarmenta, L.F.G.1
Van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
42
-
-
0025564050
-
Implementing faul-tolerant services using the state machine approach: A tutorial
-
Dec
-
F.B. Schneider, "Implementing Faul-Tolerant Services Using the State Machine Approach: A Tutorial, " ACM Computing Surveys, vol. 22, no. 4, pp. 299-319, Dec. 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
43
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
DOI 10.1145/1217935.1217951, 1217951, Proceedings of the 2006 EuroSys Conference
-
L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth, "Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies, " SIGOPS Operating Systems Rev., vol. 40, no. 4, pp. 161-174, 2006. (Pubitemid 47485745)
-
(2006)
Proceedings of the 2006 EuroSys Conference
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Hartig, H.3
Helmuth, C.4
-
44
-
-
74049150935
-
BFT protocols under fire
-
Apr
-
A. Singh, P. Maniatis, P. Druschel, and T. Roscoe, "BFT Protocols under Fire, " Proc. Fourth Symp. Networked Systems Design and Implementation, Apr. 2008.
-
(2008)
Proc. Fourth Symp. Networked Systems Design and Implementation
-
-
Singh, A.1
Maniatis, P.2
Druschel, P.3
Roscoe, T.4
-
45
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
Nov
-
M. van Dijk, J. Rhodes, L.F. G. Sarmenta, and S. Devadas, "Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks, " Proc. Second ACM Workshop Scalable Trusted Computing, pp. 41-48, Nov. 2007.
-
(2007)
Proc. Second ACM Workshop Scalable Trusted Computing
, pp. 41-48
-
-
Van Dijk, M.1
Rhodes, J.2
Sarmenta, L.F.G.3
Devadas, S.4
-
46
-
-
38949093199
-
Travelling through wormholes: A new look at distributed systems models
-
P. Verissimo, "Travelling through Wormholes: A New Look at Distributed Systems Models, " SIGACT News, vol. 37, no. 1, pp. 66-81, 2006.
-
(2006)
SIGACT News
, vol.37
, Issue.1
, pp. 66-81
-
-
Verissimo, P.1
-
47
-
-
0036041527
-
SEDA: An architecture for well-conditioned, scalable internet services
-
DOI 10.1145/502059.502057
-
M. Welsh, D. Culler, and E. Brewer, "Seda: An Architecture for Well-Conditioned, Scalable Internet Services, " Proc. 18th ACM Symp. Operating Systems Principles, pp. 230-243, 2001. (Pubitemid 33612617)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 230-243
-
-
Welsh, M.1
Culler, D.2
Brewer, E.3
-
48
-
-
27644457078
-
Transparent runtime randomization for security
-
Proceedings - 22nd International Symposium on Reliable Distributed Systems, SRDS 2003
-
J. Xu, Z. Kalbarczyk, and R.K. Iyer, "Transparent Runtime Randomization for Security, " Proc. 22nd IEEE Symp. Reliable Distributed Systems, pp. 260-269, Oct. 2003. (Pubitemid 41550528)
-
(2003)
Proceedings of the IEEE Symposium on Reliable Distributed Systems
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
49
-
-
21644446595
-
Separating agreement from execution for Byzantine fault tolerant services
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
J. Yin, J. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin, "Separating Agreement from Execution for Byzantine Fault Tolerant Services, " Proc. 19th ACM Symp. Operating Systems Principles, pp. 253-267, Oct. 2003. (Pubitemid 40929701)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 253-267
-
-
Yin, J.1
Martin, J.-P.2
Venkataramani, A.3
Alvisi, L.4
Dahlin, M.5
-
50
-
-
0345757359
-
COCA: A secure distributed online certification authority
-
DOI 10.1145/571637.571638
-
L. Zhou, F. Schneider, and R. van Renesse, "COCA: A Secure Distributed On-Line Certification Authority, " ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002. (Pubitemid 135702589)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|