Serviços Distribuídos Tolerantes a Intrusões: resultados recentes e problemas abertos
暂无分享,去创建一个
[1] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[2] David K. Gifford,et al. Weighted voting for replicated data , 1979, SOSP '79.
[3] Avishai Wool,et al. The load and availability of Byzantine quorum systems , 1997, PODC '97.
[4] Stefano Tessaro,et al. Asynchronous verifiable information dispersal , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).
[5] Jean-Philippe Martin,et al. A framework for dynamic Byzantine storage , 2004, International Conference on Dependable Systems and Networks, 2004.
[6] Michael Dahlin,et al. Small byzantine quorum systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[7] Miguel Castro,et al. BASE: Using abstraction to improve fault tolerance , 2003, TOCS.
[8] André Schiper,et al. Muteness detectors for consensus with Byzantine processes , 1998, PODC '98.
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[11] Sarita V. Adve,et al. Shared Memory Consistency Models: A Tutorial , 1996, Computer.
[12] Michael K. Reiter,et al. Secure and scalable replication in Phalanx , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[13] Miguel Correia,et al. Solving vector consensus with a wormhole , 2005, IEEE Transactions on Parallel and Distributed Systems.
[14] William H. Sanders,et al. Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Miguel Correia,et al. Efficient Byzantine-resilient reliable multicast on a hybrid failure model , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[17] Michael K. Reiter,et al. Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.
[18] L.E. Moser,et al. The SecureGroup group communication system , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[19] Michael K. Reiter,et al. Unreliable intrusion detection in distributed computations , 1997, Proceedings 10th Computer Security Foundations Workshop.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Moni Naor,et al. Access Control and Signatures via Quorum Secret Sharing , 1998, IEEE Trans. Parallel Distributed Syst..
[22] Jaynarayan H. Lala,et al. Foundations of Intrusion Tolerant Systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[23] Noga Alon,et al. Scalable Secure Storage when Half the System Is Faulty , 2000, ICALP.
[24] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[25] David Powell,et al. A fault- and intrusion- tolerant file system , 1985 .
[26] William H. Sanders,et al. Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures , 2003, LADC.
[27] Miguel Correia,et al. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture , 2004 .
[28] Gabriel Bracha,et al. An asynchronous [(n - 1)/3]-resilient consensus protocol , 1984, PODC '84.
[29] FrazerKen. Building secure software , 2002 .
[30] William H. Sanders,et al. Quantifying the cost of providing intrusion tolerance in group communication systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[31] Anna Lysyanskaya,et al. Asynchronous verifiable secret sharing and proactive cryptosystems , 2002, CCS '02.
[32] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[33] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[34] Paulo Veríssimo,et al. How resilient are distributed f fault/intrusion-tolerant systems? , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[35] Miguel Correia,et al. Worm-IT - A wormhole-based intrusion-tolerant group communication system , 2007, J. Syst. Softw..
[36] Rida A. Bazzi,et al. Non-skipping Timestamps for Byzantine Data Storage Systems , 2004, DISC.
[37] Fred B. Schneider,et al. CODEX: a robust and secure secret distribution system , 2004, IEEE Transactions on Dependable and Secure Computing.
[38] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[39] Miguel Correia,et al. The Design of a COTSReal-Time Distributed Security Kernel , 2002, EDCC.
[40] Victor Shoup,et al. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography , 2000, Journal of Cryptology.
[41] Michael Gertz,et al. THE WILLOW SURVIVABILITY ARCHITECTURE , 2001 .
[42] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[43] Feiyi Wang,et al. SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[44] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[45] Stefano Tessaro,et al. Optimal Resilience for Erasure-Coded Byzantine Distributed Storage , 2005, International Conference on Dependable Systems and Networks (DSN'06).
[46] Paulo Veríssimo,et al. Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.
[47] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[48] Paulo Veríssimo,et al. Proactive resilience through architectural hybridization , 2006, SAC.
[49] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[50] T. Markham,et al. Distributed embedded firewalls with virtual private groups , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[51] Jean-Claude Laprie,et al. Diversity against accidental and deliberate faults , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).
[52] Miguel Correia,et al. How to tolerate half less one Byzantine nodes in practical distributed systems , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[53] Christian Cachin,et al. Secure INtrusion-Tolerant Replication on the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.
[54] Michael K. Reiter,et al. An Architecture for Survivable Coordination in Large Distributed Systems , 2000, IEEE Trans. Knowl. Data Eng..
[55] Paulo Veríssimo. Uncertainty and predictability: can they be reconciled? , 2003 .
[56] Leslie Lamport,et al. Interprocess Communication , 2020, Practical System Programming with C.
[57] Michael Dahlin,et al. Minimal Byzantine Storage , 2002, DISC.
[58] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[59] Louise E. Moser,et al. The SecureRing group communication system , 2001, TSEC.
[60] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[61] Antonio Casimiro,et al. The Timely Computing Base Model and Architecture , 2002, IEEE Trans. Computers.
[62] Rachid Guerraoui,et al. Encapsulating Failure Detection: From Crash to Byzantine Failures , 2002, Ada-Europe.
[63] Kishor S. Trivedi,et al. Security analysis of SITAR intrusion tolerance system , 2003, SSRS '03.
[64] Louise E. Moser,et al. Byzantine-Resistant Total Ordering Algorithms , 1999, Inf. Comput..
[65] Michael K. Reiter,et al. The Rampart Toolkit for Building High-Integrity Services , 1994, Dagstuhl Seminar on Distributed Systems.
[66] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[67] Sam Toueg,et al. A Modular Approach to Fault-Tolerant Broadcasts and Related Problems , 1994 .
[68] Maurice Herlihy,et al. Linearizability: a correctness condition for concurrent objects , 1990, TOPL.
[69] Jean-Philippe Martin,et al. Fast Byzantine Consensus , 2006, IEEE Transactions on Dependable and Secure Computing.
[70] H. Venkateswaran,et al. Responsive Security for Stored Data , 2003, IEEE Trans. Parallel Distributed Syst..
[71] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[72] Michael K. Reiter,et al. Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.
[73] Victor Shoup,et al. Secure and efficient asynchronous broadcast protocols : (Extended abstract) , 2001, CRYPTO 2001.
[74] Arun Venkataramani,et al. Separating agreement from execution for byzantine fault tolerant services , 2003, SOSP '03.
[75] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[76] William H. Sanders,et al. Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[77] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[78] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[79] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[80] Tal Rabin,et al. Secure distributed storage and retrieval , 2000, Theor. Comput. Sci..
[81] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[82] Angelos D. Keromytis,et al. A holistic approach to service survivability , 2003, SSRS '03.
[83] Louise E. Moser,et al. Byzantine Fault Detectors for Solving Consensus , 2003, Comput. J..
[84] Michel Raynal,et al. Consensus in Byzantine asynchronous systems , 2003, J. Discrete Algorithms.
[85] Miguel Correia,et al. Low complexity Byzantine-resilient consensus , 2005, Distributed Computing.