-
1
-
-
33845427383
-
Fault-scalable Byzantine fault-tolerant services
-
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. Fault-scalable Byzantine fault-tolerant services. In Proc. 20th ACM Symposium on Operating Systems Principles (SOSP), pp. 59-74, 2005.
-
(2005)
Proc. 20th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 59-74
-
-
Abd-El-Malek, M.1
Ganger, G.R.2
Goodson, G.R.3
Reiter, M.K.4
Wylie, J.J.5
-
2
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proc. Symposium on Operating Systems Design and Implementation (OSDI), pp. 1-14, 2002.
-
(2002)
Proc. Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
5
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, 2002.
-
(2002)
ACM Transactions on Computer Systems (TOCS)
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
7
-
-
41149157410
-
Attested append-only memory: Making adversaries stick to their word
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: Making adversaries stick to their word. In Proc. Symposium on Operating Systems Principles (SOSP), pp. 189-204, 2007.
-
(2007)
Proc. Symposium on Operating Systems Principles (SOSP)
, pp. 189-204
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
8
-
-
4544312693
-
Incentives build robustness in BitTorrent
-
B. Cohen. Incentives build robustness in BitTorrent. In P2PEcon, 2003.
-
(2003)
P2PEcon
-
-
Cohen, B.1
-
9
-
-
85009705400
-
HQ replication: A hybrid quorum protocol for Byzantine fault tolerance
-
J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In Proc. Symposium on Operating Systems Design and Implementation (OSDI), pp. 177-190, 2006.
-
(2006)
Proc. Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 177-190
-
-
Cowling, J.1
Myers, D.2
Liskov, B.3
Rodrigues, R.4
Shrira, L.5
-
10
-
-
4544240978
-
Low latency and cheat-proof event ordering for peer-to-peer games
-
C. GauthierDickey, D. Zappala, V. Lo, and J. Marr. Low latency and cheat-proof event ordering for peer-to-peer games. In NOSSDAV, 2004.
-
(2004)
NOSSDAV
-
-
GauthierDickey, C.1
Zappala, D.2
Lo, V.3
Marr, J.4
-
11
-
-
85076907768
-
-
Gemalto. http://www.gemalto.com/.
-
-
-
-
12
-
-
85076915307
-
Compup2p: An architecture for sharing of compute power in peer-to-peer networks with selfish nodes
-
R. Gupta and A. K. Somani. CompuP2P: An architecture for sharing of compute power in peer-to-peer networks with selfish nodes. In Proc. NetEcon, 2004.
-
(2004)
Proc. NetEcon
-
-
Gupta, R.1
Somani, A.K.2
-
14
-
-
80051567793
-
NYSIAD: Practical protocol transformation to tolerate Byzantine failures
-
C. Ho, R. van Renesse, M. Bickford, and D. Dolev. Nysiad: Practical protocol transformation to tolerate Byzantine failures. In Proc. Symposium on Networked Systems Design and Implementation (NSDI), pp. 175-188, 2008.
-
(2008)
Proc. Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 175-188
-
-
Ho, C.1
Van Renesse, R.2
Bickford, M.3
Dolev, D.4
-
15
-
-
22744442756
-
Free riding on Gnutella revisited: The bell tolls?
-
D. Hughes, G. Coulson, and J. Walkerdine. Free riding on Gnutella revisited: The bell tolls? IEEE Distributed Systems Online, 6(6):1-18, 2005.
-
(2005)
IEEE Distributed Systems Online
, vol.6
, Issue.6
, pp. 1-18
-
-
Hughes, D.1
Coulson, G.2
Walkerdine, J.3
-
16
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. USENIX Conference on File and Storage Technologies (FAST), pp. 29-42, 2003.
-
(2003)
Proc. USENIX Conference on File and Storage Technologies (FAST)
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
18
-
-
41149091269
-
ZyzzyVa: Speculative Byzantine fault tolerance
-
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: Speculative Byzantine fault tolerance. In Proc. Symposium on Operating Systems Principles (SOSP), pp. 45-58, 2007.
-
(2007)
Proc. Symposium on Operating Systems Principles (SOSP)
, pp. 45-58
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
19
-
-
0034440650
-
OceanStore: An architecture for global-scale persistent storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proc. Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS), 2000.
-
(2000)
Proc. Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Eaton, P.4
Geels, D.5
Gummadi, R.6
Rhea, S.7
Weatherspoon, H.8
Weimer, W.9
Wells, C.10
Zhao, B.11
-
20
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. E. Shostak, and M. C. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3):382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.E.2
Pease, M.C.3
-
21
-
-
65249172430
-
BitTorrent is an auction: Analyzing and improving BitTorrent's incentives
-
D. Levin, K. LaCurts, N. Spring, and B. Bhattacharjee. BitTorrent is an auction: Analyzing and improving BitTorrent's incentives. In Proc. SIGCOMM Conference on Data Communication, pp. 243-254, 2008.
-
(2008)
Proc. SIGCOMM Conference on Data Communication
, pp. 243-254
-
-
Levin, D.1
LaCurts, K.2
Spring, N.3
Bhattacharjee, B.4
-
22
-
-
77952379905
-
Secure untrusted data Repository (SUNDR)
-
J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proc. Symposium on Operating Systems Design and Implementation (OSDI), pp. 121-136, 2004.
-
(2004)
Proc. Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.N.2
Mazières, D.3
Shasha, D.4
-
23
-
-
34848824488
-
Robust incentives via multi-level tit-for-tat
-
Q. Lian, Y. Peng, M. Yang, Z. Zhang, Y. Dai, and X. Li. Robust incentives via multi-level tit-for-tat. In Proc. Workshop on Peer-to-Peer Systems (IPTPS), 2006.
-
(2006)
Proc. Workshop on Peer-to-Peer Systems (IPTPS)
-
-
Lian, Q.1
Peng, Y.2
Yang, M.3
Zhang, Z.4
Dai, Y.5
Li, X.6
-
24
-
-
85134026938
-
Free riding in BitTorrent is cheap
-
T. Locher, P. Moor, S. Schmid, and R. Wattenhofer. Free riding in BitTorrent is cheap. In Proc. Workshop on Hot Topics in Networks (HotNets), pp. 85-90, 2006.
-
(2006)
Proc. Workshop on Hot Topics in Networks (HotNets)
, pp. 85-90
-
-
Locher, T.1
Moor, P.2
Schmid, S.3
Wattenhofer, R.4
-
25
-
-
0004215089
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
N. A. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1996.
-
(1996)
Distributed Algorithms
-
-
Lynch, N.A.1
-
28
-
-
84978427421
-
Ivy: A read/write peer-to-peer file system
-
A. Muthitacharoen, R. Morris, T. Gil, and B. Chen. Ivy: A read/write peer-to-peer file system. In Proc. Symposium on Operating Systems Design and Implementation (OSDI), pp. 31-44, 2002.
-
(2002)
Proc. Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 31-44
-
-
Muthitacharoen, A.1
Morris, R.2
Gil, T.3
Chen, B.4
-
31
-
-
1142304945
-
SAM: A flexible and secure auction architecture using trusted hardware
-
A. Perrig, S. Smith, D. Song, and J. D. Tygar. SAM: A flexible and secure auction architecture using trusted hardware. In ICEC, 2001.
-
(2001)
ICEC
-
-
Perrig, A.1
Smith, S.2
Song, D.3
Tygar, J.D.4
-
32
-
-
84860665629
-
Do incentives build robustness in BitTorrent?
-
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in BitTorrent? In Proc. Symposium on Networked Systems Design and Implementation (NSDI), pp. 1-14, 2007.
-
(2007)
Proc. Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 1-14
-
-
Piatek, M.1
Isdal, T.2
Anderson, T.3
Krishnamurthy, A.4
Venkataramani, A.5
-
33
-
-
85091111009
-
Handling churn in a DHT
-
S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz. Handling churn in a DHT. In Proc. USENIX Annual Technical Conference, pp. 127-140, 2004.
-
(2004)
Proc. USENIX Annual Technical Conference
, pp. 127-140
-
-
Rhea, S.1
Geels, D.2
Roscoe, T.3
Kubiatowicz, J.4
-
34
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
L. F. G. Sarmenta, M. van Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In Proc. Workshop on Scalable Trusted Computing (STC), 2006.
-
(2006)
Proc. Workshop on Scalable Trusted Computing (STC)
-
-
Sarmenta, L.F.G.1
Van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
36
-
-
85085477485
-
Dandelion: Cooperative content distribution with robust incentives
-
M. Sirivianos, J. H. Park, X. Yang, and S. Jarecki. Dandelion: Cooperative content distribution with robust incentives. In Proc. USENIX Annual Technical Conference, pp. 157-170, 2007.
-
(2007)
Proc. USENIX Annual Technical Conference
, pp. 157-170
-
-
Sirivianos, M.1
Park, J.H.2
Yang, X.3
Jarecki, S.4
-
37
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for Internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. SIGCOMM Conference on Data Communication, pp. 149-160, 2001.
-
(2001)
Proc. SIGCOMM Conference on Data Communication
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
40
-
-
41149146993
-
Tolerating Byzantine faults in transaction processing systems using commit barrier scheduling
-
B. Vandiver, H. Balakrishnan, B. Liskov, and S. Madden. Tolerating Byzantine faults in transaction processing systems using commit barrier scheduling. In Proc. Symposium on Operating Systems Principles (SOSP), pp. 59-72, 2007.
-
(2007)
Proc. Symposium on Operating Systems Principles (SOSP)
, pp. 59-72
-
-
Vandiver, B.1
Balakrishnan, H.2
Liskov, B.3
Madden, S.4
-
44
-
-
27544500277
-
Securing BGP through secure origin BGP
-
R. White. Securing BGP through Secure Origin BGP. Internet Protocol Journal, 6(3), 2003.
-
(2003)
Internet Protocol Journal
, vol.6
, Issue.3
-
-
White, R.1
-
45
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proc. Joint Conference of the IEEE Computer and Communication Societies (INFOCOM), 2003.
-
(2003)
Proc. Joint Conference of the IEEE Computer and Communication Societies (INFOCOM)
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
|