How to make replicated data secure (1988)

by Maurice P. Herlihy , J. D. Tygar
Venue:Advances in Cryptology - CRYPTO
Citations:43 - 1 self

Documents Related by Co-Citation

1754 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
457 Efficient dispersal of information for security, load balancing, and fault tolerance – Michael Rabin - 1989
794 Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial – Fred B. Schneider, Fred B. Schneider - 1990
384 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment – Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - 2002
936 Oceanstore: An architecture for global-scale persistent storage – John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Zhao - 2000
404 Small Byzantine Quorum Systems – Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin - 2001
623 Kerberos: An Authentication Service for Open Network Systems – Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - 1988
844 Wide-area cooperative storage with CFS – Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica - 2001
814 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
665 Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility – Antony Rowstron, Peter Druschel - 2001
529 Weighted Voting for Replicated Data – David K. Gifford - 1979
1227 The Byzantine Generals Problem – Leslie Lamport, Robert Shostak, Marshall Pease - 1982
544 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
42 How to securely replicate services – Michael Reiter, Kenneth Birman - 1994
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
96 A Prototype Implementation of Archival Intermemory – Yuan Chen, Jan Edler, Andrew Goldberg, Allan Gottlieb, Sumeet Sobti, Peter Yianilos - 1999
61 Survivable Information Storage Systems – Jay Wylie, Michael Bigrigg, John Strunk, Gregory Ganger, Han Kiliccote, Pradeep Khosla, Michael W, John D, Gregory R, Han Kılıççöte, Pradeep K - 2000
127 Self-securing Storage: Protecting Data in Compromised Systems – John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, Gregory R. Ganger - 2000
219 Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement – Flaviu Cristian, Houtan Aghili, Ray Strong, Danny Dolev - 1985