{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:29Z","timestamp":1750308929229,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2004,7]]},"abstract":"<jats:p>Due to the enterprise internationalization nowadays, each sub-company of the enterprise is located in different place. Under such circumstances, each sub-company must better itself with greater power and ability through coordination. Unfortunately, malicious hacker possibly fakes the communications between the sub-companies. The messages from sub-company might be changed in an unsecured environment. Thus, this paper proposes the Two-Phase Agreement (TPA) protocol to make easy the sub-companies' communication with the main-company or decision-making in company conference.<\/jats:p>","DOI":"10.1145\/1035834.1035840","type":"journal-article","created":{"date-parts":[[2005,1,26]],"date-time":"2005-01-26T16:49:14Z","timestamp":1106758154000},"page":"42-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["New application of reliable agreement"],"prefix":"10.1145","volume":"38","author":[{"given":"Kuo-Qin","family":"Yan","sequence":"first","affiliation":[{"name":"Chaoyang University of Technology"}]},{"given":"Shu-Ching","family":"Wang","sequence":"additional","affiliation":[{"name":"Chaoyang University of Technology"}]},{"given":"Mao-Lun","family":"Chiang","sequence":"additional","affiliation":[{"name":"National Chung-Hsing University"}]}],"member":"320","published-online":{"date-parts":[[2004,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(97)00202-0"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2455.214112"},{"key":"e_1_2_1_4_1","first-page":"139","article-title":"Byzantine Agreement with Authentication: Observations and Applications in Tolerating Hybrid and Link Faults","volume":"10","author":"Gong L.","year":"1995","unstructured":"L. Gong , P. Lincoln , and J. Rushby , \" Byzantine Agreement with Authentication: Observations and Applications in Tolerating Hybrid and Link Faults ,\" IEEE Computer Society press on Dependable Computing and Fault Systems , vol. 10 , pp. 139 -- 157 , 1995 . L. Gong, P. Lincoln, and J. Rushby, \"Byzantine Agreement with Authentication: Observations and Applications in Tolerating Hybrid and Link Faults,\" IEEE Computer Society press on Dependable Computing and Fault Systems, vol. 10, pp. 139--157, 1995.","journal-title":"IEEE Computer Society press on Dependable Computing and Fault Systems"},{"key":"e_1_2_1_5_1","first-page":"270","volume-title":"Proceedings of the Twenty-Eighth Hawaii International Conference on","author":"Hyeun-Suk R.","year":"1995","unstructured":"R. Hyeun-Suk , H. Pirkul , V. Jacob , and R. Barhki , \" Effects of computer-mediated communication on group negotiation: an empirical study,\" System Sciences, Vol.4 , Proceedings of the Twenty-Eighth Hawaii International Conference on , pp. 270 -- 279 , 1995 . R. Hyeun-Suk, H. Pirkul, V. Jacob, and R. Barhki, \"Effects of computer-mediated communication on group negotiation: an empirical study,\" System Sciences, Vol.4, Proceedings of the Twenty-Eighth Hawaii International Conference on, pp. 270--279, 1995."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/850927.851767"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_8_1","first-page":"232","article-title":"Research on network based conceptual design","author":"Ma C.","year":"2001","unstructured":"C. Ma , Hongan Wang , and Guozhong Dai \" Research on network based conceptual design ,\" The Sixth International Conference on Computer Supported Cooperative Work in Design , pp. 232 -- 235 , 2001 . C. Ma, Hongan Wang, and Guozhong Dai \"Research on network based conceptual design,\" The Sixth International Conference on Computer Supported Cooperative Work in Design, pp. 232--235, 2001.","journal-title":"The Sixth International Conference on Computer Supported Cooperative Work in Design"},{"key":"e_1_2_1_9_1","first-page":"122","volume-title":"Optimized Authenticated Self-synchronizing Byzantine Agreement Protocols,\" in the Proceedings of Pacific Rim International Symposium","author":"Postma A.","year":"1997","unstructured":"A. Postma , T. Krol , and E. Molenkamp . \" Optimized Authenticated Self-synchronizing Byzantine Agreement Protocols,\" in the Proceedings of Pacific Rim International Symposium , pp. 122 -- 129 , 1997 . A. Postma, T. Krol, and E. Molenkamp. \"Optimized Authenticated Self-synchronizing Byzantine Agreement Protocols,\" in the Proceedings of Pacific Rim International Symposium, pp. 122--129, 1997."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73014"},{"key":"e_1_2_1_11_1","first-page":"302","volume-title":"Fault-Tolerant Causal Delivery In Group Communication,\" in the Proceedings of International Conference of Parallel and Distributed Systems","author":"Shima K.","year":"1996","unstructured":"K. Shima , H. Higaki , and M. Takizawa , \" Fault-Tolerant Causal Delivery In Group Communication,\" in the Proceedings of International Conference of Parallel and Distributed Systems , pp. 302 -- 309 , 1996 . K. Shima, H. Higaki, and M. Takizawa, \"Fault-Tolerant Causal Delivery In Group Communication,\" in the Proceedings of International Conference of Parallel and Distributed Systems, pp. 302--309, 1996."},{"key":"e_1_2_1_12_1","first-page":"380","volume-title":"Proceedings. 18th International Conference on","author":"Steiner M.","year":"1998","unstructured":"M. Steiner , G. Tsudik , and M. Waidner , \" CLIQUES: a new approach to group key agreement,\" Distributed Computing Systems, 1998 . Proceedings. 18th International Conference on , pp. 380 -- 387 , 1998 . M. Steiner, G. Tsudik, and M. Waidner, \"CLIQUES: a new approach to group key agreement,\" Distributed Computing Systems, 1998. Proceedings. 18th International Conference on, pp. 380--387, 1998."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.372796"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00015-0"},{"key":"e_1_2_1_16_1","first-page":"132","volume-title":"Proceedings. Third Asia Pacific","author":"Tsujino K.","year":"1998","unstructured":"T, Yamaoka, K. Tsujino , T. Yoshida , and S. Nishida , \" Supporting mutual understanding in collaborative design project,\" Computer Human Interaction, 1998 . Proceedings. Third Asia Pacific , pp. 132 -- 137 , 1998 . T, Yamaoka, K. Tsujino, T. Yoshida, and S. Nishida, \"Supporting mutual understanding in collaborative design project,\" Computer Human Interaction, 1998. Proceedings. Third Asia Pacific, pp. 132--137, 1998."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1035834.1035840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1035834.1035840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1035834.1035840"}},"subtitle":["underlying an unsecured business environment"],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,7]]}},"alternative-id":["10.1145\/1035834.1035840"],"URL":"https:\/\/doi.org\/10.1145\/1035834.1035840","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2004,7]]},"assertion":[{"value":"2004-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}