{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:25Z","timestamp":1773511165995,"version":"3.50.1"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2012,2,16]],"date-time":"2012-02-16T00:00:00Z","timestamp":1329350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2012,2,16]]},"abstract":"<jats:p>We present commensal cuckoo,* a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an arbitrary adaptive manner, e.g., to collocate them in the same group. Commensal cuckoo addresses serious practical limitations of the state-ofthe- art scheme, the cuckoo rule of Awerbuch and Scheideler, tolerating 32x--41x more faulty nodes with groups as small as 64 nodes (as compared to the hundreds required by the cuckoo rule). Secure group partitioning is a key component of highly-scalable, reliable systems such as Byzantine faulttolerant distributed hash tables (DHTs).<\/jats:p>","DOI":"10.1145\/2146382.2146389","type":"journal-article","created":{"date-parts":[[2012,2,22]],"date-time":"2012-02-22T18:42:36Z","timestamp":1329936156000},"page":"33-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Commensal cuckoo"],"prefix":"10.1145","volume":"46","author":[{"given":"Siddhartha","family":"Sen","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Michael J.","family":"Freedman","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]}],"member":"320","published-online":{"date-parts":[[2012,2,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060291"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27836-8_18"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148109.1148163"},{"key":"e_1_2_1_4_1","volume-title":"IPTPS","author":"Awerbuch B.","year":"2007"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.10.003"},{"key":"e_1_2_1_6_1","unstructured":"M. Castro. Practical Byzantine Fault-Tolerance. PhD thesis M.I.T. 2000.  M. Castro. Practical Byzantine Fault-Tolerance. PhD thesis M.I.T. 2000."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060317"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629602"},{"key":"e_1_2_1_10_1","volume-title":"USENIX ATC","author":"Cowling J.","year":"2009"},{"key":"e_1_2_1_11_1","volume-title":"USENIX Security","author":"Crosby S. A.","year":"2003"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11561071_71"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_15"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39989-6_23"},{"key":"e_1_2_1_16_1","volume-title":"Manuscript","author":"Jaffe A.","year":"2011"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217937"},{"key":"e_1_2_1_18_1","volume-title":"NDSS","author":"Kapadia A.","year":"2008"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.21"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1998.656294"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1809315.1809321"},{"key":"e_1_2_1_25_1","volume-title":"NSDI","author":"Levin D.","year":"2009"},{"key":"e_1_2_1_26_1","volume-title":"OSDI","author":"Li H. C.","year":"2008"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273340.1273350"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73014"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647369.723763"},{"key":"e_1_2_1_32_1","unstructured":"R. Rodrigues. Robust Services in Dynamic Systems. PhD thesis M.I.T. 2005.   R. Rodrigues. Robust Services in Dynamic Systems. PhD thesis M.I.T. 2005."},{"key":"e_1_2_1_33_1","volume-title":"HotDep","author":"Rodrigues R.","year":"2007"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133396"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.11.004"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060694"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756190"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.50"},{"key":"e_1_2_1_42_1","unstructured":"Vuze. http:\/\/www.vuze.com\/.  Vuze. http:\/\/www.vuze.com\/."},{"key":"e_1_2_1_44_1","volume-title":"NDSS","author":"Wolchok S.","year":"2010"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.31"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2146382.2146389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2146382.2146389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:02Z","timestamp":1750243922000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2146382.2146389"}},"subtitle":["secure group partitioning for large-scale services"],"short-title":[],"issued":{"date-parts":[[2012,2,16]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2,16]]}},"alternative-id":["10.1145\/2146382.2146389"],"URL":"https:\/\/doi.org\/10.1145\/2146382.2146389","relation":{},"ISSN":["0163-5980"],"issn-type":[{"value":"0163-5980","type":"print"}],"subject":[],"published":{"date-parts":[[2012,2,16]]},"assertion":[{"value":"2012-02-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}