{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:47:35Z","timestamp":1725540455920},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642051470"},{"type":"electronic","value":"9783642051487"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05148-7_50","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T10:29:40Z","timestamp":1257503380000},"page":"708-725","source":"Crossref","is-referenced-by-count":0,"title":["Proactive Byzantine Quorum Systems"],"prefix":"10.1007","author":[{"given":"Eduardo A. P.","family":"Alchieri","sequence":"first","affiliation":[]},{"given":"Alysson Neves","family":"Bessani","sequence":"additional","affiliation":[]},{"given":"Fernando Carlos","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Joni","family":"da Silva Fraga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Amir, Y., Danilov, C., Kirsch, J., Lane, J., Dolev, D., Nita-Rotaru, C., Olsen, J., Zage, D.: Scaling Byzantine fault-tolerant replication to wide area networks. In: Proc. of the International Conference on Dependable Systems and Networks, pp. 105\u2013114 (2006)","key":"50_CR1","DOI":"10.1109\/DSN.2006.63"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. of the 1st ACM Conference on Computer and Communications Security, November 1993, pp. 62\u201373 (1993)","key":"50_CR2","DOI":"10.1145\/168588.168596"},{"unstructured":"Bessani, A., Daidone, A., Gashi, I., Obelheiro, R., Sousa, P., Stankovic, V.: Enhancing fault\/intrusion tolerance through design and configuration diversity. In: Proc. of the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (June 2009)","key":"50_CR3"},{"issue":"4","key":"50_CR4","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M. Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault-tolerance and proactive recovery. ACM Transactions on Computer Systems\u00a020(4), 398\u2013461 (2002)","journal-title":"ACM Transactions on Computer Systems"},{"unstructured":"Correia, R., Sousa, P.: WEST: Wormhole-enhanced state transfer. In: Proc. of the DSN 2009 Workshop on Proactive Failure Avoidance, Recovery and Maintenance, PFARM (June 2009)","key":"50_CR5"},{"doi-asserted-by":"crossref","unstructured":"Dantas, W.S., Bessani, A.N., da Silva F.J., Correia, M.: Evaluating Byzantine quorum systems. In: Proc. of the 26th IEEE International Symposium on Reliable Distributed Systems (2007)","key":"50_CR6","DOI":"10.1109\/SRDS.2007.34"},{"doi-asserted-by":"crossref","unstructured":"Gifford, D.: Weighted voting for replicated data. In: Proc. of the 7th ACM Symposium on Operating Systems Principles, December 1979, pp. 150\u2013162 (1979)","key":"50_CR7","DOI":"10.1145\/800215.806583"},{"issue":"1","key":"50_CR8","first-page":"203","volume":"1","author":"L. Lamport","year":"1986","unstructured":"Lamport, L.: On interprocess communication (part II). Distributed Computing\u00a01(1), 203\u2013213 (1986)","journal-title":"Distributed Computing"},{"issue":"3","key":"50_CR9","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programing Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programing Languages and Systems"},{"doi-asserted-by":"crossref","unstructured":"Liskov, B., Rodrigues, R.: Tolerating Byzantine faulty clients in a quorum system. In: Proc. of the 26th IEEE International Conference on Distributed Computing Systems (June 2006)","key":"50_CR10","DOI":"10.1109\/ICDCS.2006.83"},{"issue":"4","key":"50_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s004460050050","volume":"11","author":"D. Malkhi","year":"1998","unstructured":"Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing\u00a011(4), 203\u2013213 (1998)","journal-title":"Distributed Computing"},{"doi-asserted-by":"crossref","unstructured":"Malkhi, D., Reiter, M.: Secure and scalable replication in Phalanx. In: Proc. of 17th Symposium on Reliable Distributed Systems, pp. 51\u201360 (1998)","key":"50_CR12","DOI":"10.1109\/RELDIS.1998.740474"},{"issue":"1","key":"50_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TDSC.2004.3","volume":"1","author":"M.A. Marsh","year":"2004","unstructured":"Marsh, M.A., Schneider, F.B.: CODEX: A robust and secure secret distribution system. IEEE Transactions on Dependable Secure Computing\u00a01(1), 34\u201347 (2004)","journal-title":"IEEE Transactions on Dependable Secure Computing"},{"unstructured":"Obelheiro, R.R., Bessani, A.N., Lung, L.C., Correia, M.: How practical are intrusion-tolerant distributed systems? DI-FCUL TR 06\u201315, Dep. of Informatics, University of Lisbon (September 2006)","key":"50_CR14"},{"issue":"2","key":"50_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"50_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 207\u2013222. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Sousa, P., Bessani, A.N., Correia, M., Neves, N.F., Verissimo, P.: Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Transactions on Parallel and Distributed Systems (to appear)","key":"50_CR17","DOI":"10.1109\/TPDS.2009.83"},{"unstructured":"Sousa, P., Neves, N.F., Verissimo, P.: How resilient are distributed f fault\/intrusion-tolerant systems? In: Proceedings of the International Conference on Dependable Systems and Networks - DSN 2005 (2005)","key":"50_CR18"},{"unstructured":"Trusted Computing Group. Trusted platform module web page (2009), \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/groups\/tpm\/","key":"50_CR19"},{"doi-asserted-by":"crossref","unstructured":"White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An integrated experimental environment for distributed systems and networks. In: Proc. of 5th Symposium on Operating Systems Design and Implementations (December 2002)","key":"50_CR20","DOI":"10.1145\/1060289.1060313"},{"issue":"4","key":"50_CR21","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/571637.571638","volume":"20","author":"L. Zhou","year":"2002","unstructured":"Zhou, L., Schneider, F., Van Rennesse, R.: COCA: A secure distributed online certification authority. ACM Transactions on Computer Systems\u00a020(4), 329\u2013368 (2002)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"3","key":"50_CR22","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/1085126.1085127","volume":"8","author":"L. Zhou","year":"2005","unstructured":"Zhou, L., Schneider, F.B., Van Renesse, R.: APSS: proactive secret sharing in asynchronous systems. ACM Transactions on Information and System Security\u00a08(3), 259\u2013286 (2005)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05148-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T11:13:39Z","timestamp":1552216419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05148-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642051470","9783642051487"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05148-7_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}