{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:45:46Z","timestamp":1725813946316},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144719"},{"type":"electronic","value":"9783319144726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14472-6_8","type":"book-chapter","created":{"date-parts":[[2014,12,9]],"date-time":"2014-12-09T09:44:09Z","timestamp":1418118249000},"page":"107-122","source":"Crossref","is-referenced-by-count":2,"title":["RoBuSt: A Crash-Failure-Resistant Distributed Storage System"],"prefix":"10.1007","author":[{"given":"Martina","family":"Eikel","sequence":"first","affiliation":[]},{"given":"Christian","family":"Scheideler","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Setzer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-75142-7_6","volume-title":"Distributed Computing","author":"B. Awerbuch","year":"2007","unstructured":"Awerbuch, B., Scheideler, C.: A Denial-of-Service Resistant DHT. In: Pelc, A. (ed.) DISC 2007. LNCS, vol.\u00a04731, pp. 33\u201347. Springer, Heidelberg (2007)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Baumgart, M., Scheideler, C., Schmid, S.: A dos-resilient information system for dynamic data management. In: Proc. SPAA, pp. 300\u2013309 (2009)","DOI":"10.1145\/1583991.1584064"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Bhargava, A., Kothapalli, K., Riley, C., Scheideler, C., Thober, M.: Pagoda: A Dynamic Overlay Network for Routing, Data Management, and Multicasting. In: Proc. of SPAA, pp. 170\u2013179 (2004)","DOI":"10.1145\/1007912.1007938"},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/102792.102801","volume":"34","author":"F. Cristian","year":"1991","unstructured":"Cristian, F.: Understanding fault-tolerant distributed systems. Commun. ACM\u00a034(2), 56\u201378 (1991)","journal-title":"Commun. ACM"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Eikel, M., Scheideler, C., Setzer, A.: RoBuSt: A Crash-Failure-Resistant Distributed Storage System (full version). ArXiv e-prints (September 2014)","DOI":"10.1007\/978-3-319-14472-6_8"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Eikel, M., Scheideler, C.: IRIS: A Robust Information System Against Insider DoS-Attacks. In: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2013, pp. 119\u2013129. ACM (2013)","DOI":"10.1145\/2486159.2486186"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1145\/383962.384010","volume-title":"Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, PODC 2001","author":"I. Gupta","year":"2001","unstructured":"Gupta, I., Chandra, T.D., Goldszmidt, G.S.: On scalable and efficient distributed failure detectors. In: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, PODC 2001, pp. 170\u2013179. ACM, New York (2001)"},{"key":"8_CR9","unstructured":"Harvey, N.J.A., Jones, M.B., Saroiu, S., Theimer, M., Wolman, A.: SkipNet: A Scalable Overlay Network with Practical Locality Properties. In: Proc. of USITS, p.\u00a09 (2003)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proc. of WWW, pp. 514\u2013524 (2001)","DOI":"10.1145\/371920.372148"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: Secure Overlay Services. In: Proc. of SIGCOMM, pp. 61\u201372 (2002)","DOI":"10.1145\/964725.633032"},{"key":"8_CR12","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1145\/2043556.2043583","volume-title":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011","author":"J.B. Leners","year":"2011","unstructured":"Leners, J.B., Wu, H., Hung, W.-L., Aguilera, M.K., Walfish, M.: Detecting failures in distributed systems with the falcon spy network. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 279\u2013294. ACM, New York (2011)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In: Proc. of CCS, pp. 8\u201319 (2003)","DOI":"10.1145\/948112.948114"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. of SIGCOMM, pp. 161\u2013172 (2001)","DOI":"10.1145\/964723.383072"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/72981.72997","volume-title":"Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, PODC 1989","author":"A.P. Sistla","year":"1989","unstructured":"Sistla, A.P., Welch, J.L.: Efficient distributed recovery using message logging. In: Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, PODC 1989, pp. 223\u2013238. ACM, New York (1989)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Kalakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, Technical Report MIT (2002)","DOI":"10.1109\/TNET.2002.808407"}],"container-title":["Lecture Notes in Computer Science","Principles of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14472-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,24]],"date-time":"2022-04-24T03:04:51Z","timestamp":1650769491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14472-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319144719","9783319144726"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14472-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}