{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:25Z","timestamp":1772163985291,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T00:00:00Z","timestamp":1192320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,14]]},"DOI":"10.1145\/1294261.1294280","type":"proceedings-article","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T12:15:18Z","timestamp":1192796118000},"page":"189-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["Attested append-only memory"],"prefix":"10.1145","author":[{"given":"Byung-Gon","family":"Chun","sequence":"first","affiliation":[{"name":"UC Berkeley, Berkeley"}]},{"given":"Petros","family":"Maniatis","sequence":"additional","affiliation":[{"name":"Intel Research Berkeley, Berkeley"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley"}]},{"given":"John","family":"Kubiatowicz","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2007,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Amazon S3. http:\/\/aws.amazon.com\/s3\/.  Amazon S3. http:\/\/aws.amazon.com\/s3\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Intel Active Management Technology (AMT). http:\/\/www.intel.com\/technology\/platform-technology\/intel-amt\/index.htm.  Intel Active Management Technology (AMT). http:\/\/www.intel.com\/technology\/platform-technology\/intel-amt\/index.htm."},{"key":"e_1_3_2_2_3_1","unstructured":"Java. http:\/\/java.sun.com\/.  Java. http:\/\/java.sun.com\/."},{"key":"e_1_3_2_2_4_1","unstructured":"SFSlite. http:\/\/www.okws.org\/doku.php?id=sfslite.  SFSlite. http:\/\/www.okws.org\/doku.php?id=sfslite."},{"key":"e_1_3_2_2_5_1","unstructured":"Trusted Computing Group (TCG). http:\/\/www.trustedcomputinggroup.org\/.  Trusted Computing Group (TCG). http:\/\/www.trustedcomputinggroup.org\/."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095817"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.483.0475"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.494101"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_2_11_1","volume-title":"Proc. of USENIX Security","author":"Berger S.","year":"2006","unstructured":"S. Berger , R. C\u00e0ceres , K. A. Goldman , R. Perez , R. Sailer , and L. van Doorn . vTPM : Virtualizing the trusted platform module . In Proc. of USENIX Security , 2006 . S. Berger, R. C\u00e0ceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proc. of USENIX Security, 2006."},{"key":"e_1_3_2_2_12_1","volume-title":"Proc. of OSDI","author":"Castro M.","year":"1999","unstructured":"M. Castro and B. Liskov . Practical Byzantine fault tolerance . In Proc. of OSDI , 1999 . M. Castro and B. Liskov. Practical Byzantine fault tolerance. In Proc. of OSDI, 1999."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. of OSDI","author":"Cowling J.","year":"2006","unstructured":"J. Cowling , D. Myers , B. Liskov , R. Rodrigues , and L. Shrira . HQ replication: A hybrid quorum protocol for Byzantine fault tolerance . In Proc. of OSDI , 2006 . J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In Proc. of OSDI, 2006."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273032"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. of USENIX FAST","author":"Kallahalla M.","year":"2003","unstructured":"M. Kallahalla , E. Riedel , R. Swaminathan , Q. Wang , and K. Fu . Plutus: Scalable secure file sharing on untrusted storage . In Proc. of USENIX FAST , 2003 . M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. of USENIX FAST, 2003."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.262588"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_2_26_1","volume-title":"Proc. of OSDI","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazi\u00e9res , and D. Shasha . Secure untrusted data repository (SUNDR) . In Proc. of OSDI , 2004 . J. Li, M. Krohn, D. Mazi\u00e9res, and D. Shasha. Secure untrusted data repository (SUNDR). In Proc. of OSDI, 2004."},{"key":"e_1_3_2_2_27_1","volume-title":"Proc. of NSDI","author":"Li J.","year":"2007","unstructured":"J. Li and D. Mazi\u00dfres . Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems . In Proc. of NSDI , 2007 . J. Li and D. Mazi\u00dfres. Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. In Proc. of NSDI, 2007."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258650"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.842262"},{"key":"e_1_3_2_2_30_1","volume-title":"Proc. of USENIX Security","author":"Maniatis P.","year":"2002","unstructured":"P. Maniatis and M. Baker . Secure history preservation through timeline entanglement . In Proc. of USENIX Security , 2002 . P. Maniatis and M. Baker. Secure history preservation through timeline entanglement. In Proc. of USENIX Security, 2002."},{"key":"e_1_3_2_2_31_1","volume-title":"Proc. of USENIX ATC","author":"McVoy L.","year":"1996","unstructured":"L. McVoy and C. Staelin . lmbench: Portable tools for performance analysis . In Proc. of USENIX ATC , 1996 . L. McVoy and C. Staelin. lmbench: Portable tools for performance analysis. In Proc. of USENIX ATC, 1996."},{"key":"e_1_3_2_2_32_1","volume-title":"Proc. of CRYPTO","author":"Merkle R. C.","year":"1987","unstructured":"R. C. Merkle . A digital signature based on a conventional encryption function . In Proc. of CRYPTO , 1987 . R. C. Merkle. A digital signature based on a conventional encryption function. In Proc. of CRYPTO, 1987."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060293"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196774"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266711"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502037"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1988.25784"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267903.1267909"}],"event":{"name":"SOSP07: ACM SIGOPS 21st Symposium on Operating Systems Principles 2007","location":"Stevenson Washington USA","acronym":"SOSP07","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1294261.1294280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1294261.1294280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:41:18Z","timestamp":1750268478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1294261.1294280"}},"subtitle":["making adversaries stick to their word"],"short-title":[],"issued":{"date-parts":[[2007,10,14]]},"references-count":40,"alternative-id":["10.1145\/1294261.1294280","10.1145\/1294261"],"URL":"https:\/\/doi.org\/10.1145\/1294261.1294280","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1323293.1294280","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,10,14]]},"assertion":[{"value":"2007-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}