{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:10:52Z","timestamp":1725761452138},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642450648"},{"type":"electronic","value":"9783642450655"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45065-5_5","type":"book-chapter","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T03:55:42Z","timestamp":1386129342000},"page":"82-102","source":"Crossref","is-referenced-by-count":7,"title":["Assured Cloud-Based Data Analysis with ClusterBFT"],"prefix":"10.1007","author":[{"given":"Julian James","family":"Stephen","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"A programmable cloud-computing research testbed, \n                    \n                      http:\/\/www.vicci.org"},{"key":"5_CR2","unstructured":"Airline Data, \n                    \n                      http:\/\/stat-computing.org\/dataexpo\/2009\/the-data.html"},{"key":"5_CR3","unstructured":"Apache Pig, \n                    \n                      http:\/\/pig.apache.org"},{"key":"5_CR4","unstructured":"Department of Defense Information Enterprise Strategic Plan (2011-2012), \n                    \n                      http:\/\/dodcio.defense.gov\/docs\/DodIESP-r16.pdf"},{"key":"5_CR5","unstructured":"High-performance Byzantine Fault-Tolerant State Machine Replication, \n                    \n                      https:\/\/code.google.com\/p\/bft-smart\/"},{"key":"5_CR6","unstructured":"Pig Lab, \n                    \n                      https:\/\/github.com\/michiard\/CLOUDS-LAB\/wiki\/Hadoop-Pig-Laboratory"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Abd-El-Malek, M., Ganger, G.R., Goodson, G.R., Reiter, M.K., Wylie, J.J.: Fault-scalable Byzantine Fault-tolerant Services. In: SIGOPS OSR, pp. 59\u201374 (2005)","DOI":"10.1145\/1095809.1095817"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In: EuroSys 2011 (2011)","DOI":"10.1145\/1966445.1966449"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Birman, K., Chockler, G., van Renesse, R.: Toward a Cloud Computing Research Agenda. SIGACT News, 68\u201380 (2009)","DOI":"10.1145\/1556154.1556172"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Brun, Y., Medvidovic, N.: Keeping Data Private while Computing in the Cloud. In: CLOUD 2012 (2012)","DOI":"10.1109\/CLOUD.2012.126"},{"key":"5_CR11","unstructured":"Burrows, M.: The Chubby Lock Service for Loosely-coupled Distributed Systems. In: OSDI 2006 (2006)"},{"key":"5_CR12","unstructured":"Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance. In: OSDI 1999 (1999)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Clement, A., Kapritsos, M., Lee, S., Wang, Y., Alvisi, L., Dahlin, M., Riche, T.: Upright Cluster Services. In: SOSP 2009 (2009)","DOI":"10.1145\/1629575.1629602"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Costa, P., Pasin, M., Bessani, A., Correia, M.: Byzantine Fault-Tolerant MapReduce: Faults are Not Just Crashes. In: CloudCom 2011 (2011)","DOI":"10.1109\/CloudCom.2011.15"},{"key":"5_CR15","unstructured":"Cowling, J., Myers, D., Liskov, B., Rodrigues, R., Shrira, L.: HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. In: OSDI 2006 (2006)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. Commun. ACM, 107\u2013113 (2008)","DOI":"10.1145\/1327452.1327492"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Denning, D.: A Lattice Model of Secure Information Flow. Commun. ACM\u00a019(5) (1976)","DOI":"10.1145\/360051.360056"},{"key":"5_CR18","unstructured":"Dutta, P., Guerraoui, R., Vukolic, M.: Best-Case Complexity of Asynchronous Byzantine Consensus. Tech. rep., EPFL (2005)"},{"key":"5_CR19","unstructured":"Hadoop: Hadoop, \n                    \n                      http:\/\/hadoop.apache.org\/"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: Byzantine Fault Detectors for Solving Consensus. The Computer Journal, 16\u201335 (2003)","DOI":"10.1093\/comjnl\/46.1.16"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: Speculative Byzantine Fault Tolerance. In: SOSP 2007 (2007)","DOI":"10.1145\/1294261.1294267"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a Social Network or a News Media? In: WWW 2010 (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Trans. Prog. Lang. and Sys., 382\u2013401 (1982)","DOI":"10.1145\/357172.357176"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-37795-6_4","volume-title":"Future Directions in Distributed Computing","author":"L. Lamport","year":"2003","unstructured":"Lamport, L.: Lower bounds for asynchronous consensus. In: Schiper, A., Shvartsman, M.M.A.A., Weatherspoon, H., Zhao, B.Y. (eds.) Future Directions in Distributed Computing. LNCS, vol.\u00a02584, pp. 22\u201323. Springer, Heidelberg (2003)"},{"key":"5_CR25","unstructured":"MRC: DARPA-BAA-11-55: I2O Mission-oriented Resilient Clouds (MRC), \n                    \n                      https:\/\/www.fbo.gov\/spg\/ODA\/DARPA\/CMO\/DARPA-BAA-11-55\/listing.html"},{"key":"5_CR26","unstructured":"NCDC: weatherdata snapshot, \n                    \n                      http:\/\/aws.amazon.com\/datasets\/2759"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Newell, A., Obenshain, D., Tantillo, T., Nita-Rotaru, C., Amir, Y.: Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. In: DSN 2013 (2013)","DOI":"10.1109\/DSN.2013.6575305"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Olston, C., Reed, B., Srivastava, U., Kumar, R., Tomkins, A.: PigLatin: A Not-so-foreign Language for Data Processing. In: SIGMOD 2008 (2008)","DOI":"10.1145\/1376616.1376726"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Olston, C., Reed, B.: Inspector Gadget: A Framework for Custom Monitoring and Debugging of Distributed Dataflows. In: SIGMOD 2011 (2011)","DOI":"10.1145\/1989323.1989459"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Parno, B., Gentry, C., Howell, J., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation. Cryptology ePrint Archive, Report 2013\/279 (2013)","DOI":"10.1109\/SP.2013.47"},{"key":"5_CR31","unstructured":"Pleisch, S., Kupsys, A., Schiper, A.: Preventing Orphan Requests in the Context of Replicated Invocation. In: SRDS 2003 (2003)"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: Protecting Confidentiality with Encrypted Query Processing. In: SOSP 2011 (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"5_CR33","unstructured":"Roy, I., Setty, S., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: Security and Privacy for MapReduce. In: NSDI 2010 (2010)"},{"key":"5_CR34","unstructured":"Setty, S., McPherson, R., Walfish, A.J.B.: M.: Making Argument Systems for Outsourced Computation Practical (Sometimes). In: NDSS 2012 (2012)"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Santos Veronese, G., Correia, M., Bessani, A., Lung, L.C.: Ebawa: Efficient byzantine agreement for wide-area networks. In: HASE 2010 (2010)","DOI":"10.1109\/HASE.2010.19"},{"key":"5_CR36","unstructured":"Setty, S., Vu, V., Panpalia, N., Braun, B., Blumberg, A.J., Walfish, M.: Taking Proof-based Verified Computation a Few Steps Closer to Practicality. In: Security 2012 (2010)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Hairong, K., Radia, S., Chansler, R.: The Hadoop Distributed File System. In: MSST 2010 (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Verissimo, P., Bessani, A., Pasin, M.: The TClouds Architecture: Open and Resilient Cloud-of-Clouds Computing. In: DSN Workshops 2012 (2012)","DOI":"10.1109\/DSNW.2012.6264686"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Yin, J., Martin, J.P., Venkataramani, A., Alvisi, L., Dahlin, M.: Separating Agreement from Execution for Byzantine Fault Tolerant Services. SIGOPS OSR, 253\u2013267 (2003)","DOI":"10.1145\/1165389.945470"},{"key":"5_CR40","unstructured":"Yu, Y., Isard, M., Fetterly, D., Budiu, M., Erlingsson, U., Gunda, P., Currey, J.: DryadLINQ: a System for General-purpose Distributed Data-parallel Computing using a High-level Language. In: OSDI 2008 (2008)"},{"key":"5_CR41","unstructured":"Zaharia, M., Chowdhury, M., Das, T., Dave, A., Ma, J., McCauley, M., Franklin, M.J., Shenker, S., Stoica, I.: Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In: NSDI 2012 (2012)"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zheng, Z., Lyu, M.R.: BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing. In: CloudCom 2012 (2012)","DOI":"10.1109\/CLOUD.2011.16"}],"container-title":["Lecture Notes in Computer Science","Middleware 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45065-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T02:57:35Z","timestamp":1558753055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45065-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642450648","9783642450655"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45065-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}