메뉴 건너뛰기




Volumn , Issue , 2005, Pages 45-58

BAR fault tolerance for cooperative services

Author keywords

byzantine fault tolerance; game theory; peer to peer; reliable systems

Indexed keywords

ACCEPTABLE PERFORMANCE; BUILDING SERVICES; BYZANTINE FAULT TOLERANCE; COOPERATIVE SERVICES; MALICIOUS NODES; PEER TO PEER; RATIONAL BEHAVIOR; RELIABLE SYSTEMS;

EID: 84885635827     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1095810.1095816     Document Type: Conference Paper
Times cited : (106)

References (63)
  • 3
    • 18144409187 scopus 로고    scopus 로고
    • Selfish behavior and stability of the internet: A game-theoretic analysis of tcp
    • ACM Press
    • A. Akella, S. Seshan, R. Karp, S. Shenker, and C. Papadimitriou. Selfish behavior and stability of the internet: a game-theoretic analysis of tcp. In Proc. SIGCOMM, pages 117-130. ACM Press, 2002.
    • (2002) Proc. SIGCOMM , pp. 117-130
    • Akella, A.1    Seshan, S.2    Karp, R.3    Shenker, S.4    Papadimitriou, C.5
  • 4
    • 0002430114 scopus 로고
    • Subjectivity and correlation in randomized strategies
    • R. J. Aumann. Subjectivity and correlation in randomized strategies. Journal of Mathematical Economics, 1(1):67-96, 1974.
    • (1974) Journal of Mathematical Economics , vol.1 , Issue.1 , pp. 67-96
    • Aumann, R.J.1
  • 5
    • 4544387814 scopus 로고    scopus 로고
    • Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science, October
    • C. Batten, K. Barr, A. Saraf, and S. Trepetin. pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science, October 2002.
    • (2002) pStore: A Secure Peer-to-peer Backup System
    • Batten, C.1    Barr, K.2    Saraf, A.3    Trepetin, S.4
  • 6
    • 0022144724 scopus 로고
    • Asynchronous consensus and broadcast protocols
    • G. Bracha and S. Toueg. Asynchronous consensus and broadcast protocols. J. ACM, 32(4):824-840, 1985.
    • (1985) J. ACM , vol.32 , Issue.4 , pp. 824-840
    • Bracha, G.1    Toueg, S.2
  • 9
    • 0347133884 scopus 로고
    • Technical Report 92-15, TR 92-15, Dept. of Computer Science, Hebrew University
    • R. Canetti and T. Rabin. Optimal Asynchronous Byzantine Agreement. Technical Report 92-15, TR 92-15, Dept. of Computer Science, Hebrew University, 1992.
    • (1992) Optimal Asynchronous Byzantine Agreement
    • Canetti, R.1    Rabin, T.2
  • 10
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • DOI 10.1145/571637.571640
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst., 20(4):398-461, 2002. (Pubitemid 135702591)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 11
    • 33845415380 scopus 로고    scopus 로고
    • Sharp: An architecture for secure resource peering
    • J. Chase, B. Chun, Y. Fu, S. Schwab, and A. Vahdat. Sharp: An architecture for secure resource peering. In SOSP, 2003.
    • (2003) SOSP
    • Chase, J.1    Chun, B.2    Fu, Y.3    Schwab, S.4    Vahdat, A.5
  • 12
    • 84885587031 scopus 로고    scopus 로고
    • The game of chicken. http://www.gametheory.net/Dictionary/Games/ GameofChicken.html.
    • The Game of Chicken
  • 14
    • 4544312693 scopus 로고    scopus 로고
    • Incentives build robustness in bittorrent
    • B. Cohen. Incentives build robustness in bittorrent. In Proc. 2nd IPTPS, 2003.
    • Proc. 2nd IPTPS, 2003
    • Cohen, B.1
  • 16
    • 21644455728 scopus 로고    scopus 로고
    • Samsara: Honor among thieves in peer-to-peer storage
    • L. P. Cox and B. D. Noble. Samsara: honor among thieves in peer-to-peer storage. In Proc. 19th SOSP, pages 120-132, 2003.
    • (2003) Proc. 19th SOSP , pp. 120-132
    • Cox, L.P.1    Noble, B.D.2
  • 18
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Springer-Verlag
    • J. R. Douceur. The Sybil attack. In Proc. 1st IPTPS, pages 251-260. Springer-Verlag, 2002.
    • (2002) Proc. 1st IPTPS , pp. 251-260
    • Douceur, J.R.1
  • 19
    • 0036655944 scopus 로고    scopus 로고
    • Fault tolerant implementation
    • K. Eliaz. Fault tolerant implementation. Review of Economic Studies, 69:589-610, Aug 2002. (Pubitemid 35036838)
    • (2002) Review of Economic Studies , vol.69 , Issue.3 , pp. 589-610
    • Eliaz, K.1
  • 21
    • 10444248045 scopus 로고    scopus 로고
    • Mechanism design for policy routing
    • ACM Press
    • J. Feigenbaum, R. Sami, and S. Shenker. Mechanism design for policy routing. In Proc. 23rd PODC, pages 11-20. ACM Press, 2004.
    • (2004) Proc. 23rd PODC , pp. 11-20
    • Feigenbaum, J.1    Sami, R.2    Shenker, S.3
  • 22
    • 0036982153 scopus 로고    scopus 로고
    • Distributed algorithmic mechanism design: Recent results and future directions
    • ACM Press, New York
    • J. Feigenbaum and S. Shenker. Distributed algorithmic mechanism design: Recent results and future directions. In Proc. 6th DIALM, pages 1-13. ACM Press, New York, 2002.
    • (2002) Proc. 6th DIALM , pp. 1-13
    • Feigenbaum, J.1    Shenker, S.2
  • 23
    • 11244327782 scopus 로고    scopus 로고
    • Free-riding and whitewashing in peer-to-peer systems
    • ACM Press
    • M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica. Free-riding and whitewashing in peer-to-peer systems. In Proc. PINS, pages 228-236. ACM Press, 2004.
    • (2004) Proc. PINS , pp. 228-236
    • Feldman, M.1    Papadimitriou, C.2    Chuang, J.3    Stoica, I.4
  • 24
    • 0022045868 scopus 로고
    • IMPOSSIBILITY OF DISTRIBUTED CONSENSUS WITH ONE FAULTY PROCESS
    • DOI 10.1145/3149.214121
    • M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, 1985. (Pubitemid 15488351)
    • (1985) Journal of the ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 26
    • 0012525797 scopus 로고    scopus 로고
    • Fully Polynomial Byzantine Agreement for n>3t Processors in t + 1 Rounds
    • J. Garay and Y. Moses. Fully Polynomial Byzantine Agreement for n>3t Processors in t + 1 Rounds. SIAM J. of Computing, 27(1), 1998.
    • (1998) SIAM J. of Computing , vol.27 , Issue.1
    • Garay, J.1    Moses, Y.2
  • 28
    • 0001233090 scopus 로고
    • A general theory of rational behavior in game situations
    • Jul.
    • J. Harsanyi. A general theory of rational behavior in game situations. Econometrica, 34(3):613-634, Jul. 1966.
    • (1966) Econometrica , vol.34 , Issue.3 , pp. 613-634
    • Harsanyi, J.1
  • 32
    • 84860058221 scopus 로고    scopus 로고
    • Charity gives 40,000 pcs a fresh start
    • February 4
    • M. Loney. Charity gives 40,000 pcs a fresh start. CNET News.com, February 4 2005. http://news.com.com/Charity+gives+403421.html.
    • (2005) CNET News.Com
    • Loney, M.1
  • 33
    • 80051768284 scopus 로고    scopus 로고
    • Sustaining cooperation in multi-hop wireless networks
    • May
    • R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Sustaining cooperation in multi-hop wireless networks. In NSDI, May 2005.
    • (2005) NSDI
    • Mahajan, R.1    Rodrig, M.2    Wetherall, D.3    Zahorjan, J.4
  • 34
    • 0001281582 scopus 로고    scopus 로고
    • Do people play Nash equilibrium? Lessons from evolutionary game theory
    • G. J. Mailath. Do people play Nash equilibrium? lessons from evolutionary game theory. Journal of Economic Literature, 36 (September 1998), 1347-1374, 1998.
    • (1998) Journal of Economic Literature , vol.36 , Issue.SEPTEMBER 1998 , pp. 1347-1374
    • Mailath, G.J.1
  • 35
    • 33845430997 scopus 로고    scopus 로고
    • Making threats credible
    • Mar.
    • D. Malhotra. Making threats credible. Negotiation, 8(3), Mar. 2005.
    • (2005) Negotiation , vol.8 , Issue.3
    • Malhotra, D.1
  • 36
    • 0032306029 scopus 로고    scopus 로고
    • Byzantine quorum systems
    • D. Malkhi and M. Reiter. Byzantine quorum systems. Distributed Computing 11/4, pages 203-213, 1998. (Pubitemid 128489949)
    • (1998) Distributed Computing , vol.11 , Issue.4 , pp. 203-213
    • Malkhi, D.1    Reiter, M.2
  • 40
    • 0000788149 scopus 로고    scopus 로고
    • Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
    • N. H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. ACM Trans. Softw. Eng. Methodol., 9(3):273-305, 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol. , vol.9 , Issue.3 , pp. 273-305
    • Minsky, N.H.1    Ungureanu, V.2
  • 41
    • 0001730497 scopus 로고
    • Non-cooperative games
    • Sept
    • J. Nash. Non-cooperative games. The Annals of Mathematics, 54:286-295, Sept 1951.
    • (1951) The Annals of Mathematics , vol.54 , pp. 286-295
    • Nash, J.1
  • 45
    • 0000421874 scopus 로고    scopus 로고
    • Algorithmic Mechanism Design
    • DOI 10.1006/game.1999.0790
    • N. Nisan and A. Ronenc. Algorithmic mechanism design. Games and Economic Behavior, 35:166-196, April 2001. (Pubitemid 33668164)
    • (2001) Games and Economic Behavior , vol.35 , Issue.1-2 , pp. 166-196
    • Nisan, N.1    Ronen, A.2
  • 47
    • 0003629990 scopus 로고    scopus 로고
    • N. I. of Standards and Technology. Technical report, U.S. Department of Commerce, August
    • N. I. of Standards and Technology. Secure hash standard. Technical report, U.S. Department of Commerce, August 2002.
    • (2002) Secure Hash Standard
  • 48
    • 0034836562 scopus 로고    scopus 로고
    • Algorithms, games, and the internet
    • ACM Press
    • C. Papadimitriou. Algorithms, games, and the internet. In Proc. 33rd STOC, pages 749-753. ACM Press, 2001.
    • (2001) Proc. 33rd STOC , pp. 749-753
    • Papadimitriou, C.1
  • 49
    • 84948956297 scopus 로고
    • The Rampart toolkit for building high-integrity services
    • M. Reiter. The Rampart toolkit for building high-integrity services. In Dagstuhl Seminar on Dist. Sys., pages 99-110, 1994.
    • (1994) Dagstuhl Seminar on Dist. Sys. , pp. 99-110
    • Reiter, M.1
  • 51
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • reprint
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM, 26(1):96-99, 1983.
    • (1983) Commun. ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 52
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • L. Rizzo. Effective erasure codes for reliable computer communication protocols. SIGCOMM Comput. Commun. Rev., 27(2):24-36, 1997. (Pubitemid 127566056)
    • (1997) Computer Communication Review , vol.27 , Issue.2 , pp. 24-36
    • Rizzo, L.1
  • 53
    • 0036036816 scopus 로고    scopus 로고
    • BASE: Using abstraction to improve fault tolerance
    • ACM Press, Oct.
    • R. Rodrigues, M. Castro, and B. Liskov. BASE: using abstraction to improve fault tolerance. In Proc. 18th SOSP, pages 15-28. ACM Press, Oct. 2001.
    • (2001) Proc. 18th SOSP , pp. 15-28
    • Rodrigues, R.1    Castro, M.2    Liskov, B.3
  • 54
    • 0036038685 scopus 로고    scopus 로고
    • Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility
    • ACM Press
    • A. Rowstron and P. Druschel. Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In Proc. 18th SOSP, pages 188-201. ACM Press, 2001.
    • (2001) Proc. 18th SOSP , pp. 188-201
    • Rowstron, A.1    Druschel, P.2
  • 55
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Comput. Surv., 22(4):299-319, 1990.
    • (1990) ACM Comput. Surv. , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 56
    • 33845420226 scopus 로고
    • Distributed Computing
    • (Editor: Sape Mullender), chapter 2, ACM Press, second edition
    • F. B. Schneider. Distributed Computing (Editor: Sape Mullender), chapter 2, "What Good are Models and What Models are Good?", pages 17-26. ACM Press, second edition, 1993.
    • (1993) What Good Are Models and What Models Are Good? , pp. 17-26
    • Schneider, F.B.1
  • 57
    • 84885579967 scopus 로고    scopus 로고
    • "seti@home". http://setiathome.ssl.berkeley.edu/.
    • Seti@home
  • 58
  • 59
    • 10444240238 scopus 로고    scopus 로고
    • Specification faithfulness in networks with rational nodes
    • ACM Press
    • J. Shneidman and D. C. Parkes. Specification faithfulness in networks with rational nodes. In Proc. 23rd PODC, pages 88-97. ACM Press, 2004.
    • (2004) Proc. 23rd PODC , pp. 88-97
    • Shneidman, J.1    Parkes, D.C.2
  • 63
    • 21644446595 scopus 로고    scopus 로고
    • Separating agreement from execution for Byzantine fault tolerant services
    • ACM Press, Oct.
    • J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating agreement from execution for Byzantine fault tolerant services. In Proc. 19th SOSP, pages 253-267. ACM Press, Oct. 2003.
    • (2003) Proc. 19th SOSP , pp. 253-267
    • Yin, J.1    Martin, J.-P.2    Venkataramani, A.3    Alvisi, L.4    Dahlin, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.