{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:42Z","timestamp":1750219842745,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,8]]},"DOI":"10.1145\/3578358.3591333","type":"proceedings-article","created":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T20:51:58Z","timestamp":1683060718000},"page":"63-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5739-8852","authenticated-orcid":false,"given":"Florian","family":"Jacob","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-3180","authenticated-orcid":false,"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,5,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.59.521"},{"key":"e_1_3_2_2_2_1","unstructured":"Herb Caudill. 2023. Local First Auth: Decentralized authentication and authorization for team collaboration using a secure chain of cryptological signatures. local-first-web. https:\/\/github.com\/local-first-web\/auth  Herb Caudill. 2023. Local First Auth: Decentralized authentication and authorization for team collaboration using a secure chain of cryptological signatures. local-first-web. https:\/\/github.com\/local-first-web\/auth"},{"key":"e_1_3_2_2_3_1","volume-title":"Chryssis Georgiou, Nicolas Nicolaou, Michel Raynal, and Antonio Russo.","author":"Cholvi Vicent","year":"2021","unstructured":"Vicent Cholvi , Antonio Fern\u00e1ndez Anta , Chryssis Georgiou, Nicolas Nicolaou, Michel Raynal, and Antonio Russo. 2021 . Byzantine-tolerant Distributed Grow-only Sets: Specification and Applications . arXiv:2103.08936 [cs.DC] Vicent Cholvi, Antonio Fern\u00e1ndez Anta, Chryssis Georgiou, Nicolas Nicolaou, Michel Raynal, and Antonio Russo. 2021. Byzantine-tolerant Distributed Grow-only Sets: Specification and Applications. arXiv:2103.08936 [cs.DC]"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.18420\/sicherheit2022_07"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395399"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058576"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517209.3524042"},{"key":"e_1_3_2_2_9_1","unstructured":"Martin Kleppmann and Heidi Howard. 2020. Byzantine eventual consistency and the fundamental limits of peer-to-peer databases. arXiv:2012.00472 [cs.DC]  Martin Kleppmann and Heidi Howard. 2020. Byzantine eventual consistency and the fundamental limits of peer-to-peer databases. arXiv:2012.00472 [cs.DC]"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335934"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/7007"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Nuno Pregui\u00e7a Carlos Baquero and Marc Shapiro. 2018. Conflict-free replicated data types (CRDTs). arXiv:1805.06358 [cs.DC]  Nuno Pregui\u00e7a Carlos Baquero and Marc Shapiro. 2018. Conflict-free replicated data types (CRDTs). arXiv:1805.06358 [cs.DC]","DOI":"10.1007\/978-3-319-63962-8_185-1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517209.3524826"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24550-3_29"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46598-2_6"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408976"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447865.3457970"}],"event":{"name":"PaPoC '23: 10th Workshop on Principles and Practice of Consistency for Distributed Data","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Rome Italy","acronym":"PaPoC '23"},"container-title":["Proceedings of the 10th Workshop on Principles and Practice of Consistency for Distributed Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578358.3591333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:52Z","timestamp":1750178812000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578358.3591333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,8]]},"references-count":16,"alternative-id":["10.1145\/3578358.3591333","10.1145\/3578358"],"URL":"https:\/\/doi.org\/10.1145\/3578358.3591333","relation":{},"subject":[],"published":{"date-parts":[[2023,5,8]]},"assertion":[{"value":"2023-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}