{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:34:56Z","timestamp":1776184496931,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T00:00:00Z","timestamp":1207008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2008,4,25]]},"abstract":"<jats:p>The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization power. Several works have tried to improve the dependability of tuple spaces through the use of replication for fault tolerance and access control for security. However, many practical applications in the Internet require both fault tolerance and security. This paper describes the design and implementation of DepSpace, a Byzantine fault-tolerant coordination service that provides a tuple space abstraction. The service offered by DepSpace is secure, reliable and available as long as less than a third of service replicas are faulty. Moreover, the content-addressable confidentiality scheme developed for DepSpace bridges the gap between Byzantine fault-tolerant replication and confidentiality of replicated data and can be used in other systems that store critical data.<\/jats:p>","DOI":"10.1145\/1357010.1352610","type":"journal-article","created":{"date-parts":[[2008,4,8]],"date-time":"2008-04-08T15:40:00Z","timestamp":1207669200000},"page":"163-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["DepSpace"],"prefix":"10.1145","volume":"42","author":[{"given":"Alysson Neves","family":"Bessani","sequence":"first","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Eduardo Pelison","family":"Alchieri","sequence":"additional","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Joni Silva","family":"Fraga","sequence":"additional","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2008,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095817"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294278"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 2006 Usenix Annual Technical Conference - Usenix'06","author":"Albrecht J.","year":"2006","unstructured":"J. Albrecht , C. Tuttle , A. C. Snoeren , and A. Vahdat . Loose synchronization for large-scale networked systems . In Proceedings of the 2006 Usenix Annual Technical Conference - Usenix'06 , 2006 . J. Albrecht, C. Tuttle, A. C. Snoeren, and A. Vahdat. Loose synchronization for large-scale networked systems. In Proceedings of the 2006 Usenix Annual Technical Conference - Usenix'06, 2006."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.372777"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.76"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of 7th Symposium on Operating Systems Design and Implementations - OSDI 2006","author":"Burrows M.","year":"2006","unstructured":"M. Burrows . The chubby lock service . In Proceedings of 7th Symposium on Operating Systems Design and Implementations - OSDI 2006 , Nov. 2006 . M. Burrows. The chubby lock service. In Proceedings of 7th Symposium on Operating Systems Design and Implementations - OSDI 2006, Nov. 2006."},{"key":"e_1_2_1_9_1","volume-title":"SecSpaces: a data-driven coordination model for environments open to untrusted agents. Electronical Notes in Theoretical Computer Science, 68(3)","author":"Busi N.","year":"2003","unstructured":"N. Busi , R. Gorrieri , R. Lucchi , and G. Zavattaro . SecSpaces: a data-driven coordination model for environments open to untrusted agents. Electronical Notes in Theoretical Computer Science, 68(3) , 2003 . N. Busi, R. Gorrieri, R. Lucchi, and G. Zavattaro. SecSpaces: a data-driven coordination model for environments open to untrusted agents. Electronical Notes in Theoretical Computer Science, 68(3), 2003."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1999.2823"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.820044"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.9"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/72551.72553"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859718"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"key":"e_1_2_1_17_1","volume-title":"Groovy programing language homepage. Avaliable at http:\/\/groovy.codehaus.org\/","year":"2006","unstructured":"Codehaus. Groovy programing language homepage. Avaliable at http:\/\/groovy.codehaus.org\/ , 2006 . Codehaus. Groovy programing language homepage. Avaliable at http:\/\/groovy.codehaus.org\/, 2006."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of 7th Symposium on Operating Systems Design and Implementations - OSDI 2006","author":"Cowling J.","year":"2006","unstructured":"J. Cowling , D. Myers , B. Liskov , R. Rodrigues , and L. Shrira . HQ-Replication: A hybrid quorum protocol for Byzantine fault tolerance . In Proceedings of 7th Symposium on Operating Systems Design and Implementations - OSDI 2006 , Nov. 2006 . J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira. HQ-Replication: A hybrid quorum protocol for Byzantine fault tolerance. In Proceedings of 7th Symposium on Operating Systems Design and Implementations - OSDI 2006, Nov. 2006."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2007.27"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 3rd International Conference on Computer Security","author":"Fraga J. S.","year":"1985","unstructured":"J. S. Fraga and D. Powell . A fault- and intrusion-tolerant file system . In Proceedings of the 3rd International Conference on Computer Security , 1985 . J. S. Fraga and D. Powell. A fault- and intrusion-tolerant file system. In Proceedings of the 3rd International Conference on Computer Security, 1985."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2363.2433"},{"key":"e_1_2_1_23_1","volume-title":"GigaSpaces - write once, scale anywere. Avaliable at http:\/\/www.gigaspaces.com\/","year":"2007","unstructured":"GigaSpaces. GigaSpaces - write once, scale anywere. Avaliable at http:\/\/www.gigaspaces.com\/ , 2007 . GigaSpaces. GigaSpaces - write once, scale anywere. Avaliable at http:\/\/www.gigaspaces.com\/, 2007."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009729"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294269"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/850929.851958"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00178-X"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.3"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.35"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/335603.335748"},{"key":"e_1_2_1_34_1","volume-title":"Dep. of Informatics","author":"Obelheiro R. R.","year":"2006","unstructured":"R. R. Obelheiro , A. N. Bessani , L. C. Lung , and M. Correia . How practical are intrusion-tolerant distributed systems? DI-FCUL TR 06-15 , Dep. of Informatics , University of Lisbon , Sept. 2006 . R. R. Obelheiro, A. N. Bessani, L. C. Lung, and M. Correia. How practical are intrusion-tolerant distributed systems? DI-FCUL TR 06-15, Dep. of Informatics, University of Lisbon, Sept. 2006."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703956"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/829516.830574"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_39_1","volume-title":"JavaSpaces service specification. Availiable at http:\/\/www.jini.org\/standards","author":"Microsystems Sun","year":"2003","unstructured":"Sun Microsystems . JavaSpaces service specification. Availiable at http:\/\/www.jini.org\/standards , 2003 . Sun Microsystems. JavaSpaces service specification. Availiable at http:\/\/www.jini.org\/standards, 2003."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1768179.1768181"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(02)00090-4"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1989.105566"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1357010.1352610","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1357010.1352610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:24Z","timestamp":1750254984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1357010.1352610"}},"subtitle":["a byzantine fault-tolerant coordination service"],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,4,25]]}},"alternative-id":["10.1145\/1357010.1352610"],"URL":"https:\/\/doi.org\/10.1145\/1357010.1352610","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1352592.1352610","asserted-by":"subject"}]},"ISSN":["0163-5980"],"issn-type":[{"value":"0163-5980","type":"print"}],"subject":[],"published":{"date-parts":[[2008,4]]},"assertion":[{"value":"2008-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}