How dependable are distributed f fault/intrusion-tolerant systems?
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[2] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[3] Flaviu Cristian,et al. The Timed Asynchronous Distributed System Model , 1998, IEEE Trans. Parallel Distributed Syst..
[4] James W. Moore,et al. Institute of Electrical and Electronics Engineers (IEEE) , 2002 .
[5] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[6] Fred B. Schneider,et al. CODEX: a robust and secure secret distribution system , 2004, IEEE Transactions on Dependable and Secure Computing.
[7] Anna Lysyanskaya,et al. Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.
[8] Santosh K. Shrivastava,et al. Reliable Computer Systems , 1985, Texts and Monographs in Computer Science.
[9] Tal Rabin,et al. Secure distributed storage and retrieval , 1997, Theor. Comput. Sci..
[10] Paulo Veríssimo. Uncertainty and predictability: can they be reconciled? , 2003 .
[11] Paulo Veríssimo,et al. Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.
[12] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[13] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[14] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[15] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[16] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[17] Miguel Correia,et al. The Design of a COTSReal-Time Distributed Security Kernel , 2002, EDCC.
[18] Robert S. Swarz,et al. Reliable Computer Systems: Design and Evaluation , 1992 .
[19] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[20] Antonio Casimiro,et al. The Timely Computing Base Model and Architecture , 2002, IEEE Trans. Computers.
[21] Daniel P. Siewiorek,et al. Reliable computer systems (2nd ed.): design and evaluation , 1992 .
[22] Sam Toueg,et al. A Modular Approach to Fault-Tolerant Broadcasts and Related Problems , 1994 .
[23] Daniel P. Siewiorek,et al. Reliable Computer Systems: Design and Evaluation, Third Edition , 1998 .