{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T04:03:58Z","timestamp":1750478638517,"version":"3.41.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319629100"},{"type":"electronic","value":"9783319629117"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62911-7_8","type":"book-chapter","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T01:47:57Z","timestamp":1498787277000},"page":"141-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Log-Based Model to Enforce Data Consistency on Agnostic Fault-Tolerant Systems"],"prefix":"10.1007","author":[{"given":"\u00d3scar Mort\u00e1gua","family":"Pereira","sequence":"first","affiliation":[]},{"given":"David Apolin\u00e1rio","family":"Sim\u00f5es","sequence":"additional","affiliation":[]},{"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,1]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1145\/356725.356729","volume":"10","author":"B Randell","year":"1978","unstructured":"Randell, B., Lee, P., Treleaven, P.C.: Reliability issues in computing system design. ACM Comput. Surv. 10, 123\u2013165 (1978). doi: 10.1145\/356725.356729","journal-title":"ACM Comput. Surv."},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Sumathi, S., Esakkirajan, S.: Fundamentals of Relational Database Management Systems. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-48399-1","DOI":"10.1007\/978-3-540-48399-1"},{"key":"8_CR3","unstructured":"Gray, J.: The transaction concept: virtues and limitations. In: Proceedings of 7th International Conference on Very Large Data Bases, pp. 144\u2013154 (1981). doi: 10.1.1.59.5051"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Pereira, \u00d3.M., Sim\u00f5es, D., Aguiar, R.L.: Endowing NoSQL DBMS with SQL features through standard call level interfaces. In: SEKE 2015 - International Conference on Software Engineering Knowledge Engineering, pp. 201\u2013207 (2015)","DOI":"10.18293\/SEKE2015-070"},{"key":"8_CR5","unstructured":"ISO: ISO\/IEC 9075-3:2003 (2003). http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=34134"},{"key":"8_CR6","volume-title":"JDBC Recipes: A Problem-Solution Approach","author":"M Parsian","year":"2005","unstructured":"Parsian, M.: JDBC Recipes: A Problem-Solution Approach. Apress, New York (2005)"},{"key":"8_CR7","unstructured":"Microsoft RecordSet (ODBC): Microsoft. http:\/\/msdn.microsoft.com\/en-us\/library\/5sbfs6f1.aspx . Accessed 16 Nov 2016"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Pereira, \u00d3.M., Aguiar, R.L., Santos, M.Y.: CRUD-DOM: a model for bridging the gap between the object-oriented and the relational paradigms. In: ICSEA 2010 - International Conference on Software Engineering Applications, Nice, France, pp. 114\u2013122 (2010)","DOI":"10.1109\/ICSEA.2010.25"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Pereira, \u00d3.M., Aguiar, R.L., Santos, M.Y.: An adaptable business component based on pre-defined business interfaces. In: 6th ENASE Evaluation of Novel Approaches to Software Engineering, Beijing, China, pp. 92\u2013103 (2011)","DOI":"10.5220\/0003462100920103"},{"key":"8_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-32341-6_8","volume-title":"Evaluation of Novel Approaches to Software Engineering","author":"OM Pereira","year":"2013","unstructured":"Pereira, O.M., Aguiar, R.L., Santos, M.Y.: ABC architecture: a new approach to build reusable and adaptable business tier components based on static business interfaces. In: Maciaszek, L.A., Zhang, K. (eds.) ENASE 2011. CCIS, vol. 275, pp. 114\u2013129. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-32341-6_8"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Pereira, \u00d3.M., Regateiro, D.D., Aguiar, R.L.: Secure, dynamic and distributed access control stack for database applications. In: SEKE 2015 - International Conference Software Engineering Knowledge Engineering, pp. 365\u2013369 (2015)","DOI":"10.18293\/SEKE2015-049"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1142\/S0218194015710035","volume":"25","author":"\u00d3M Pereira","year":"2015","unstructured":"Pereira, \u00d3.M., Regateiro, D.D., Aguiar, R.L.: Secure, dynamic and distributed access control stack for database applications. Int. J. Softw. Eng. Knowl. Eng. 25, 1703\u20131708 (2015). doi: 10.1142\/S0218194015710035","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Pereira, \u00d3.M., Sim\u00f5es, D.A., Aguiar, R.L.: Fault tolerance logging-based model for deterministic systems. In: DATA 2016 - 5th International Conference on Data Science Technology Application, Lisbon, Portugal, pp. 119\u2013126. SCITEPRESS (2016)","DOI":"10.5220\/0005979101190126"},{"key":"8_CR14","unstructured":"Balaji, P., Buntinas, D., Kimpe, D.: Fault Tolerance Techniques for Scalable Computing. In: McsAnlGov, pp. 1\u201333 (2012)"},{"key":"8_CR15","unstructured":"Borges, A.R.: Introductory concepts. Lecture on Distributed Systems (2015)"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Elnozahy, E.N.(M)., Alvisi, L., Wang, Y.-M., Johnson, D.B.: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34, 375\u2013408 (2002). doi: 10.1145\/568522.568525","DOI":"10.1145\/568522.568525"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Bhargava, B., Lian, S.-R.: Independent checkpointing and concurrent rollback for recovery in distributed systems - an optimistic approach. In: Proceedings of Seventh Symposium Reliable Distributed Systems, pp. 3\u201312 (1988). doi: 10.1109\/RELDIS.1988.25775","DOI":"10.1109\/RELDIS.1988.25775"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"KM Chandy","year":"1985","unstructured":"Chandy, K.M., Lamport, L.: Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst. 3, 63\u201375 (1985). doi: 10.1145\/214451.214456","journal-title":"ACM Trans. Comput. Syst."},{"key":"8_CR19","unstructured":"Johnson, D.B.: Distributed system fault tolerance using message logging and checkpointing. Ph.D. Dissertation. Rice University, Houston, TX, USA. AAI9110983 (1990)"},{"key":"8_CR20","unstructured":"Brown, M.: Event logging system and method for logging events in a network system (1999)"},{"key":"8_CR21","unstructured":"Heemels, J.P., Carlson, G.M., Spinelli, J.C.: Data logging system for implantable cardiac device (1997)"},{"key":"8_CR22","unstructured":"Fraker, W.F., Storm, J.M.: Position and time-at-position logging system (1999)"},{"key":"8_CR23","unstructured":"Salmassy, O.E., Sullivan, R.E.: Statistical and environmental data logging system for data processing storage subsystem (1972)"},{"key":"8_CR24","unstructured":"Anderson, R.A.: Automatic process logging system (1959)"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/128765.128770","volume":"17","author":"C Mohan","year":"1992","unstructured":"Mohan, C., Haderle, D., Lindsay, B., et al.: ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM Trans. Database Syst. 17, 94\u2013162 (1992). doi: 10.1145\/128765.128770","journal-title":"ACM Trans. Database Syst."},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Huang, K.H., Abraham, J.A.: Algorithm-based fault tolerance for matrix operations. IEEE Trans. Comput. 33, 518\u2013528 (1984). doi: 10.1109\/TC.1984.1676475","DOI":"10.1109\/TC.1984.1676475"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"MO Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36, 335\u2013348 (1989). doi: 10.1145\/62044.62050","journal-title":"J. ACM"},{"key":"8_CR28","doi-asserted-by":"publisher","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The Hadoop distributed file system. In: 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies MSST2010 (2010). doi: 10.1109\/MSST.2010.5496972","DOI":"10.1109\/MSST.2010.5496972"},{"key":"8_CR29","unstructured":"Yl\u00f6nen, T.: Concurrent shadow paging: a new direction for database research (1992)"},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Oki, B.M., Liskov, B.H.: Viewstamped replication: a new primary copy method to support highly-available distributed systems. In: PODC 1988 Proceedings of Seventh Annual ACM Symposium on Principles of Distributed Computing, vol. 62, pp. 8\u201317 (1988). doi: 10.1145\/62546.62549","DOI":"10.1145\/62546.62549"},{"key":"8_CR31","unstructured":"Shih, K.-Y., Srinivasan, U.: Method and system for data replication (2003)"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/249978.249982","volume":"22","author":"O Wolfson","year":"1997","unstructured":"Wolfson, O., Jajodia, S., Huang, Y.: An adaptive data replication algorithm. ACM Trans. Database Syst. 22, 255 (1997)","journal-title":"ACM Trans. Database Syst."},{"key":"8_CR33","doi-asserted-by":"publisher","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of Symposium on Operating Systems Design and Implementation, pp. 1\u201314 (1999). doi: 10.1145\/571637.571640","DOI":"10.1145\/571637.571640"},{"key":"8_CR34","unstructured":"Bershad, B., ACM Digital Library, ACM Special Interest Group in Operating Systems, et al.: HQ replication: a hybrid quorum protocol for Byzantine fault tolerance. In: Proceedings of 7th Symposium on Operating System Design and Implementation, p. 407 (2006)"},{"key":"8_CR35","doi-asserted-by":"publisher","unstructured":"Castro, M.: Practical Byzantine fault tolerance and proactive recovery. ToCS 20, 398\u2013461 (2002). doi: 10.1145\/571637.571640","DOI":"10.1145\/571637.571640"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Merideth, M.G., Iyengar, A., Mikalsen, T., et al.: Thema: Byzantine-fault-tolerant middleware for web-service applications. In: Proceedings of IEEE Symposium on Reliable Distributed Systems, pp. 131\u2013140 (2005)","DOI":"10.1109\/RELDIS.2005.28"},{"key":"8_CR37","unstructured":"Chun, B., Maniatis, P., Shenker, S.: Diverse replication for single-machine Byzantine-fault tolerance. In: USENIX Annual Technical Conference, pp. 287\u2013292 (2008)"},{"key":"8_CR38","doi-asserted-by":"publisher","unstructured":"Kotla, R., Dahlin, M.: High throughput Byzantine fault tolerance. In: Proceedings of 2004 International Conference on Dependable System Networks, p. 575 (2004). doi: 10.1109\/DSN.2004.1311928","DOI":"10.1109\/DSN.2004.1311928"},{"key":"8_CR39","doi-asserted-by":"publisher","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, p. 9 (2008). doi: 10.1007\/s10838-008-9062-0 , www.bitcoin.org","DOI":"10.1007\/s10838-008-9062-0"},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1394127.1394128","volume":"6","author":"D Pritchett","year":"2008","unstructured":"Pritchett, D.: Base: an acid alternative. Queue 6, 48\u201355 (2008)","journal-title":"Queue"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Gusella, R., Zatti, S.: An election algorithm for a distributed clock synchronization program (1985)","DOI":"10.21236\/ADA611781"}],"container-title":["Communications in Computer and Information Science","Data Management Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62911-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T14:56:31Z","timestamp":1750431391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62911-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319629100","9783319629117"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62911-7_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"1 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DATA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Management Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colmar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"data2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dataconference.org\/?y=2016","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}