{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:10:58Z","timestamp":1748664658522,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319246437"},{"type":"electronic","value":"9783319246444"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24644-4_6","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T05:34:39Z","timestamp":1443072879000},"page":"84-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Theory of Integrating Tamper Evidence with Stabilization"],"prefix":"10.1007","author":[{"given":"Reza","family":"Hajisheykhi","sequence":"first","affiliation":[]},{"given":"Ali","family":"Ebnenasir","sequence":"additional","affiliation":[]},{"given":"Sandeep S.","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-58468-4_162","volume-title":"Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"A. Arora","year":"1994","unstructured":"Arora, A.: Efficient reconfiguration of trees: A case study in methodical design of nonmasking fault-tolerant programs. In: Langmaack, H., de Roever, W.-P., Vytopil, J. (eds.) FTRTFT 1994 and ProCoS 1994. LNCS, vol.\u00a0863, pp. 110\u2013127. Springer, Heidelberg (1994)"},{"issue":"3","key":"6_CR2","doi-asserted-by":"crossref","first-page":"293","DOI":"10.3233\/JHS-1996-5305","volume":"5","author":"A. Arora","year":"1996","unstructured":"Arora, A., Gouda, M., Varghese, G.: Constraint satisfaction as a basis for designing nonmasking fault-tolerant systems. Journal of High Speed Networks\u00a05(3), 293\u2013306 (1996)","journal-title":"Journal of High Speed Networks"},{"issue":"11","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/32.256850","volume":"19","author":"A. Arora","year":"1993","unstructured":"Arora, A., Gouda, M.G.: Closure and convergence: A foundation of fault-tolerant computing. IEEE Transactions on Software Engineering\u00a019(11), 1015\u20131027 (1993)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Beauquier, J., Kekkonen-Moneta, S.: On ftss-solvable distributed problems. In: WSS, pp. 64\u201379 (1997)","DOI":"10.1145\/259380.259515"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bonakdarpour, B., Kulkarni, S.S.: Compositional verification of fault-tolerant real-time programs. In: EMSOFT, pp. 29\u201338 (2009)","DOI":"10.1145\/1629335.1629341"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/978-3-642-05089-3_42","volume-title":"FM 2009: Formal Methods","author":"B. Bonakdarpour","year":"2009","unstructured":"Bonakdarpour, B., Kulkarni, S.S.: On the complexity of synthesizing relaxed and graceful bounded-time 2-phase recovery. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol.\u00a05850, pp. 660\u2013675. Springer, Heidelberg (2009)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-24550-3_8","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"B. Bonakdarpour","year":"2011","unstructured":"Bonakdarpour, B., Kulkarni, S.S.: Active stabilization. In: D\u00e9fago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol.\u00a06976, pp. 77\u201391. Springer, Heidelberg (2011)"},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02278854","volume":"7","author":"J.E. Burns","year":"1993","unstructured":"Burns, J.E., Gouda, M., Miller, R.E.: Stabilization and pseudo-stabilization. Distributed Computing\u00a07(1), 35\u201342 (1993)","journal-title":"Distributed Computing"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Devismes, S., Tixeuil, S., Yamashita, M.: Weak vs. self vs. probabilistic stabilization. In: ICDCS 2008, pp. 681\u2013688 (2008)","DOI":"10.1109\/ICDCS.2008.12"},{"issue":"11","key":"6_CR10","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1145\/361179.361202","volume":"17","author":"E.W. Dijkstra","year":"1974","unstructured":"Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Communications of the ACM\u00a017(11), 643\u2013644 (1974)","journal-title":"Communications of the ACM"},{"key":"6_CR11","unstructured":"Dijkstra, E.W.: A Discipline of Programming. Prentice-Hall (1990)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Dolev, S.: Self-Stabilization. MIT Press (2000)","DOI":"10.7551\/mitpress\/6156.001.0001"},{"issue":"1","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2063239.2063240","volume":"21","author":"A. Ebnenasir","year":"2011","unstructured":"Ebnenasir, A., Kulkarni, S.S.: Feasibility of stepwise design of multitolerant programs. TOSEM\u00a021(1), 1\u201349 (2011)","journal-title":"TOSEM"},{"issue":"5","key":"6_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/0020-0190(96)00121-4","volume":"59","author":"S. Ghosh","year":"1996","unstructured":"Ghosh, S., Gupta, A.: An exercise in fault-containment: Self-stabilizing leader election. Information Processing Letters\u00a059(5), 281\u2013288 (1996)","journal-title":"Information Processing Letters"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Gouda, M.: Elements of security: Closure, convergence, and protection. Information Processing Letters\u00a077(2-4), 109\u2013114 (2001); In honor of Edsger W. Dijkstra","DOI":"10.1016\/S0020-0190(00)00207-6"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-45438-1_8","volume-title":"Self-Stabilizing Systems","author":"M. Gouda","year":"2001","unstructured":"Gouda, M.: The theory of weak stabilization. In: Datta, A.K., Herman, T. (eds.) WSS 2001. LNCS, vol.\u00a02194, pp. 114\u2013123. Springer, Heidelberg (2001)"},{"key":"6_CR17","unstructured":"Hajisheykhi, R., Ebnenasir, A., Kulkarni, S.: Tamper-evident stabilization. Technical Report MSU-CSE-14-4 (June 2014)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Israeli, A., Jalfon, M.: Token management schemes and random walks yield self-stabilizing mutual exclusion. In: PODC, pp. 119\u2013131 (1990)","DOI":"10.1145\/93385.93409"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Kulkarni, S., Arora, A.: Multitolerance in distributed reset. Chicago Journal of Theoretical Computer Science\u00a01998(4) (December 1998)","DOI":"10.4086\/cjtcs.1998.004"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J.C., Horowitz, M.: Architectural support for copy and tamper resistant software. In: ASPLOS, pp. 168\u2013177 (2000)","DOI":"10.1145\/356989.357005"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-49823-0_29","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"M.R. Malekpour","year":"2006","unstructured":"Malekpour, M.R.: A byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol.\u00a04280, pp. 411\u2013427. Springer, Heidelberg (2006)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Nesterenko, M., Arora, A.: Tolerance to unbounded byzantine faults. In: SRDS, pp. 22\u201331 (2002)","DOI":"10.1109\/RELDIS.2002.1180170"},{"issue":"8","key":"6_CR23","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"W. Sean","year":"1999","unstructured":"Sean, W.: Smith and Steve Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks\u00a031(8), 831\u2013860 (1999)","journal-title":"Computer Networks"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Clarke, D.E., Gassend, B., van Dijk, M., Devadas, S.: Aegis: architecture for tamper-evident and tamper-resistant processing. In: ICS, pp. 160\u2013171 (2003)","DOI":"10.1145\/782814.782838"},{"issue":"18","key":"6_CR25","doi-asserted-by":"publisher","first-page":"3585","DOI":"10.1016\/j.comnet.2006.03.001","volume":"50","author":"H. Zhang","year":"2006","unstructured":"Zhang, H., Arora, A.: Guaranteed fault containment and local stabilization in routing. Computer Networks\u00a050(18), 3585\u20133607 (2006)","journal-title":"Computer Networks"}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24644-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:53:11Z","timestamp":1748634791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24644-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319246437","9783319246444"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24644-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"12 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}