{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:12Z","timestamp":1750220352759,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Office of Naval Research","award":["N000141912361"],"award-info":[{"award-number":["N000141912361"]}]},{"name":"EU Horizon 2020","award":["825377"],"award-info":[{"award-number":["825377"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3484266.3487387","type":"proceedings-article","created":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T22:31:15Z","timestamp":1636065075000},"page":"199-205","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Immunizing Systems from Distant Failures by Limiting Lamport Exposure"],"prefix":"10.1145","author":[{"given":"Cristina","family":"B\u0103sescu","sequence":"first","affiliation":[{"name":"Swiss Federal Institute of Technology (EPFL)"}]},{"given":"Bryan","family":"Ford","sequence":"additional","affiliation":[{"name":"Swiss Federal Institute of Technology (EPFL)"}]}],"member":"320","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2021. Amazon Web Services cloud regions. https:\/\/aws.amazon.com\/about- aws\/global-infrastructure\/?p=ngi&loc=1. (2021).  Amazon. 2021. Amazon Web Services cloud regions. https:\/\/aws.amazon.com\/about- aws\/global-infrastructure\/?p=ngi&loc=1. (2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"Conference on Operating Systems Design and Implementation (OSDI).","author":"Annamalai Muthukaruppan","year":"2018","unstructured":"Muthukaruppan Annamalai , Kaushik Ravichandran , Harish Srinivas , Igor Zinkovsky , Luning Pan , Tony Savor , David Nagle , and Michael Stumm . 2018 . Sharding the Shards: Managing Datastore Locality at Scale with Akkio . In Conference on Operating Systems Design and Implementation (OSDI). Muthukaruppan Annamalai, Kaushik Ravichandran, Harish Srinivas, Igor Zinkovsky, Luning Pan, Tony Savor, David Nagle, and Michael Stumm. 2018. Sharding the Shards: Managing Datastore Locality at Scale with Akkio. In Conference on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_3_1","volume-title":"Millions of Tiny Databases. In Conference on Networked Systems Design and Implementation (NSDI).","author":"Brooker Marc","year":"2020","unstructured":"Marc Brooker , Tao Chen , and Fan Ping . 2020 . Millions of Tiny Databases. In Conference on Networked Systems Design and Implementation (NSDI). Marc Brooker, Tao Chen, and Fan Ping. 2020. Millions of Tiny Databases. In Conference on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_4_1","unstructured":"Kathy Frankovic. 2020. Americans trust local governments over the federal government on COVID-19. https:\/\/today.yougov.com\/topics\/politics\/articles-reports\/2020\/04\/27\/americans-trust-local-governments. (2020).  Kathy Frankovic. 2020. Americans trust local governments over the federal government on COVID-19. https:\/\/today.yougov.com\/topics\/politics\/articles-reports\/2020\/04\/27\/americans-trust-local-governments. (2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.389"},{"key":"e_1_3_2_1_7_1","unstructured":"Google. 2021. Google cloud regions. https:\/\/cloud.google.com\/about\/locations. (2021).  Google. 2021. Google cloud regions. https:\/\/cloud.google.com\/about\/locations. (2021)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 169--184","author":"Guerraoui Rachid","year":"2016","unstructured":"Rachid Guerraoui , Matej Pavlovic , and Dragos-Adrian Seredinschi . 2016 . Incremental Consistency Guarantees for Replicated Objects . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 169--184 . Rachid Guerraoui, Matej Pavlovic, and Dragos-Adrian Seredinschi. 2016. Incremental Consistency Guarantees for Replicated Objects. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 169--184."},{"key":"e_1_3_2_1_9_1","volume-title":"Decentralized Storage Despite Massive Correlated Failures. In Symposium on Networked Systems Design and Implementation (NSDI).","author":"Haeberlen Andreas","year":"2005","unstructured":"Andreas Haeberlen , Alan Mislove , and Peter Druschel . 2005 . Glacier: Highly Durable , Decentralized Storage Despite Massive Correlated Failures. In Symposium on Networked Systems Design and Implementation (NSDI). Andreas Haeberlen, Alan Mislove, and Peter Druschel. 2005. Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. In Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_10_1","volume-title":"Meaningful Availability. In USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Hauer Tam\u00e1s","year":"2020","unstructured":"Tam\u00e1s Hauer , Philipp Hoffmann , John Lunney , Dan Ardelean , and Amer Diwan . 2020 . Meaningful Availability. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). Tam\u00e1s Hauer, Philipp Hoffmann, John Lunney, Dan Ardelean, and Amer Diwan. 2020. Meaningful Availability. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_11_1","volume-title":"Fastly says single customer triggered bug behind mass internet outage. https:\/\/www.theguardian.com\/technology\/2021\/jun\/09\/fastly-says-single-customer-triggered-bug-that-caused-mass-outage. (May","author":"Hern Alex","year":"2021","unstructured":"Alex Hern . 2021. Fastly says single customer triggered bug behind mass internet outage. https:\/\/www.theguardian.com\/technology\/2021\/jun\/09\/fastly-says-single-customer-triggered-bug-that-caused-mass-outage. (May 2021 ). Alex Hern. 2021. Fastly says single customer triggered bug behind mass internet outage. https:\/\/www.theguardian.com\/technology\/2021\/jun\/09\/fastly-says-single-customer-triggered-bug-that-caused-mass-outage. (May 2021)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_13_1","first-page":"4","article-title":"Paxos Made Simple","volume":"32","author":"Lamport Leslie","year":"2001","unstructured":"Leslie Lamport . 2001 . Paxos Made Simple . ACM SIGACT News 32 , 4 (Dec. 2001), 51--58. Leslie Lamport. 2001. Paxos Made Simple. ACM SIGACT News 32, 4 (Dec. 2001), 51--58.","journal-title":"ACM SIGACT News"},{"key":"e_1_3_2_1_14_1","volume-title":"Consistent When Necessary. In Conference on Operating Systems Design and Implementation (OSDI).","author":"Li Cheng","year":"2012","unstructured":"Cheng Li , Daniel Porto , Allen Clement , Johannes Gehrke , Nuno Pregui\u00e7a , and Rodrigo Rodrigues . 2012 . Making Geo-Replicated Systems Fast as Possible , Consistent When Necessary. In Conference on Operating Systems Design and Implementation (OSDI). Cheng Li, Daniel Porto, Allen Clement, Johannes Gehrke, Nuno Pregui\u00e7a, and Rodrigo Rodrigues. 2012. Making Geo-Replicated Systems Fast as Possible, Consistent When Necessary. In Conference on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_15_1","volume-title":"Cloudflare outage. https:\/\/blog.cloudflare.com\/a-byzantine-failure-in-the-real-world\/. (Nov","author":"Lianza Tom","year":"2020","unstructured":"Tom Lianza and Chris Snook . 2020. Cloudflare outage. https:\/\/blog.cloudflare.com\/a-byzantine-failure-in-the-real-world\/. (Nov . 2020 ). Tom Lianza and Chris Snook. 2020. Cloudflare outage. https:\/\/blog.cloudflare.com\/a-byzantine-failure-in-the-real-world\/. (Nov. 2020)."},{"key":"e_1_3_2_1_16_1","unstructured":"Ben Lobel. 2020. Local businesses are more trusted than large enterprises finds survey by Yell. https:\/\/smallbusiness.co.uk\/local-businesses-trusted-large-enterprises-2538416\/. (2020).  Ben Lobel. 2020. Local businesses are more trusted than large enterprises finds survey by Yell. https:\/\/smallbusiness.co.uk\/local-businesses-trusted-large-enterprises-2538416\/. (2020)."},{"key":"e_1_3_2_1_17_1","unstructured":"Microsoft. 2021. Microsoft Azure cloud regions. https:\/\/azure.microsoft.com\/en-us\/global-infrastructure\/geographies\/. (2021).  Microsoft. 2021. Microsoft Azure cloud regions. https:\/\/azure.microsoft.com\/en-us\/global-infrastructure\/geographies\/. (2021)."},{"key":"e_1_3_2_1_18_1","unstructured":"Netscout. 2021. Netscout security report. (2021). https:\/\/www.arbornetworks.com\/resources\/infrastructure-security-report.  Netscout. 2021. Netscout security report. (2021). https:\/\/www.arbornetworks.com\/resources\/infrastructure-security-report."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Annual Technical Conference (ATC).","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout . 2014 . In Search of an Understandable Consensus Algorithm . In USENIX Annual Technical Conference (ATC). Diego Ongaro and John Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In USENIX Annual Technical Conference (ATC)."},{"key":"e_1_3_2_1_20_1","volume-title":"3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud).","author":"Peterson Zachary N. J.","year":"2011","unstructured":"Zachary N. J. Peterson , Mark Gondree , and Robert Beverly . 2011 . A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud . In 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud). Zachary N. J. Peterson, Mark Gondree, and Robert Beverly. 2011. A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud. In 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)."},{"key":"e_1_3_2_1_21_1","first-page":"27","article-title":"Digital Sovereignty or Digital Colonialism","volume":"15","author":"Pinto Renata \u00c1vila","year":"2018","unstructured":"Renata \u00c1vila Pinto . 2018 . Digital Sovereignty or Digital Colonialism ? SUR 15 , 27 (July 2018), 15--27. Renata \u00c1vila Pinto. 2018. Digital Sovereignty or Digital Colonialism? SUR 15, 27 (July 2018), 15--27.","journal-title":"SUR"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963471"},{"key":"e_1_3_2_1_23_1","unstructured":"Laura Stevens. 2017. Amazon Finds the Cause of Its AWS Outage: A Typo. (2017). https:\/\/www.wsj.com\/articles\/amazon-finds-the-cause-of-its-aws-outage-a-typo-1488490506\/.  Laura Stevens. 2017. Amazon Finds the Cause of Its AWS Outage: A Typo. (2017). https:\/\/www.wsj.com\/articles\/amazon-finds-the-cause-of-its-aws-outage-a-typo-1488490506\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.","author":"Stevenson D.","year":"1989","unstructured":"D. Stevenson . 1989 . Token-based consistency of replicated servers. In Digest of Papers. COMPCON Spring 89 . Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage. D. Stevenson. 1989. Token-based consistency of replicated servers. In Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ahren Studer and Adrian Perrig. 2009. The Coremelt Attack. In ESORICS.  Ahren Studer and Adrian Perrig. 2009. The Coremelt Attack. In ESORICS.","DOI":"10.1007\/978-3-642-04444-1_3"},{"volume-title":"The Crossfire Attack. IEEE Symposium on Security and Privacy (S&P).","author":"Kang Min Suk","key":"e_1_3_2_1_26_1","unstructured":"Min Suk Kang , Soo Bum Lee , and V.D. Gligor . 2013 . The Crossfire Attack. IEEE Symposium on Security and Privacy (S&P). Min Suk Kang, Soo Bum Lee, and V.D. Gligor. 2013. The Crossfire Attack. IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1044731.1044732"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/378580.378581"}],"event":{"name":"HotNets '21: The 20th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event United Kingdom","acronym":"HotNets '21"},"container-title":["Proceedings of the Twentieth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487387","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484266.3487387","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484266.3487387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:13Z","timestamp":1750191433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,4]]},"references-count":28,"alternative-id":["10.1145\/3484266.3487387","10.1145\/3484266"],"URL":"https:\/\/doi.org\/10.1145\/3484266.3487387","relation":{},"subject":[],"published":{"date-parts":[[2021,11,4]]},"assertion":[{"value":"2021-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}