{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:35:16Z","timestamp":1776976516980,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","funder":[{"name":"Cooperativa Tecnol\u00f3gica de Viana do Castelo","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"name":"Inria","award":["Alvearium Challenge"],"award-info":[{"award-number":["Alvearium Challenge"]}]},{"name":"MICIU\/AEI\/10.13039\/501100011033","award":["CEX2024-001471-M"],"award-info":[{"award-number":["CEX2024-001471-M"]}]},{"name":"MICIU\/AEI\/10.13039\/501100011033, ERDF, and ESF+","award":["PID2022-140560OB- I00"],"award-info":[{"award-number":["PID2022-140560OB- I00"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UID\/50014\/2025"],"award-info":[{"award-number":["UID\/50014\/2025"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,27]]},"DOI":"10.1145\/3806077.3806698","type":"proceedings-article","created":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:41:39Z","timestamp":1776973299000},"page":"17-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bounding Byzantine Impact in Open CRDT Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3933-6850","authenticated-orcid":false,"given":"Carlos","family":"Baquero","sequence":"first","affiliation":[{"name":"Universidade do Porto &amp; INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0729-4569","authenticated-orcid":false,"given":"Francisco","family":"Maia","sequence":"additional","affiliation":[{"name":"Universidade do Porto &amp; INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5865-1858","authenticated-orcid":false,"given":"Abel","family":"Dantas","sequence":"additional","affiliation":[{"name":"Universidade do Porto &amp; INESC TEC, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6501-2377","authenticated-orcid":false,"given":"Antonio Fern\u00e1ndez","family":"Anta","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute &amp; IMDEA Networks Institute, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6730-5744","authenticated-orcid":false,"given":"Davide","family":"Frey","sequence":"additional","affiliation":[{"name":"Inria, Univ Rennes, CNRS, IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3927-4773","authenticated-orcid":false,"given":"C\u00e9sar","family":"S\u00e1nchez","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9419-6646","authenticated-orcid":false,"given":"Timoth\u00e9","family":"Albouy","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2026,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.19368001"},{"key":"e_1_3_2_1_2_1","volume-title":"November","author":"Almeida Paulo S\u00e9rgio","year":"2024","unstructured":"Paulo S\u00e9rgio Almeida. Approaches to conflict-free replicated data types. ACM Comput. Surv., 57(2), November 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"The blocklace: A Byzantine-repelling and universal conflict-free replicated data type. arXiv preprint arXiv:2402.08068","author":"Almeida Paulo S\u00e9rgio","year":"2024","unstructured":"Paulo S\u00e9rgio Almeida and Ehud Shapiro. The blocklace: A Byzantine-repelling and universal conflict-free replicated data type. arXiv preprint arXiv:2402.08068, 2024."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2596631.2596632"},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in Cryptology - CRYPTO 2018","volume":"10991","author":"Boneh Dan","year":"2018","unstructured":"Dan Boneh, Joseph Bonneau, Benedikt B\u00fcnz, and Ben Fisch. Verifiable delay functions. In Advances in Cryptology - CRYPTO 2018, volume 10991 of Lecture Notes in Computer Science, pages 757\u2013788. Springer, 2018."},{"key":"e_1_3_2_1_6_1","first-page":"186","volume-title":"Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI)","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov. Practical Byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI), pages 173\u2013186, 1999."},{"key":"e_1_3_2_1_7_1","volume-title":"Chryssis Georgiou, Nicolas Nicolaou, Michel Raynal, and Antonio Russo. Byzantine-tolerant distributed grow-only sets: Specification and applications. arXiv preprint arXiv:2103.08936","author":"Cholvi Vicent","year":"2021","unstructured":"Vicent Cholvi, Antonio Fern\u00e1ndez Anta, Chryssis Georgiou, Nicolas Nicolaou, Michel Raynal, and Antonio Russo. Byzantine-tolerant distributed grow-only sets: Specification and applications. arXiv preprint arXiv:2103.08936, 2021."},{"key":"e_1_3_2_1_8_1","first-page":"147","volume-title":"Advances in Cryptology - CRYPTO '92","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Advances in Cryptology - CRYPTO '92, pages 139\u2013147, 1992."},{"key":"e_1_3_2_1_9_1","first-page":"23","volume-title":"37th International Symposium on Distributed Computing (DISC 2023), volume 281 of Leibniz International Proceedings in Informatics (LIPIcs)","author":"Frey Davide","year":"2023","unstructured":"Davide Frey, Mathieu Gestin, and Michel Raynal. The synchronization power (consensus number) of access-control objects: the case of allowlist and denylist. In Rotem Oshman, editor, 37th International Symposium on Distributed Computing (DISC 2023), volume 281 of Leibniz International Proceedings in Informatics (LIPIcs), pages 21:1\u201321:23, Dagstuhl, Germany, 2023. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_1_10_1","volume-title":"Process-commutative distributed objects: From cryptocurrencies to Byzantine-fault-tolerant CRDTs. arXiv preprint arXiv:2311.13936","author":"Frey Davide","year":"2023","unstructured":"Davide Frey, Lucie Guillou, Michel Raynal, and Fran\u00e7ois Ta\u00efani. Process-commutative distributed objects: From cryptocurrencies to Byzantine-fault-tolerant CRDTs. arXiv preprint arXiv:2311.13936, 2023."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/automerge\/automerge","author":"Good Alex","year":"2017","unstructured":"Alex Good, Joseph Gentle, and Martin Kleppmann. Automerge. https:\/\/github.com\/automerge\/automerge, 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Distributed Computing Systems (DISC 2021 Posters)","author":"Jacob Florian","year":"2021","unstructured":"Florian Jacob, Saskia Bayreuther, and Hannes Hartenstein. On conflict-free replicated data types and equivocation in Byzantine setups. In Distributed Computing Systems (DISC 2021 Posters), 2021. arXiv:2109.10554."},{"key":"e_1_3_2_1_14_1","first-page":"126","volume-title":"Christian Wressnegger, Delphine Reinhardt, Thomas Barber","author":"Jacob Florian","year":"2022","unstructured":"Florian Jacob, Saskia Bayreuther, and Hannes Hartenstein. On CRDTs in Byzantine environments. In Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, and Zolt\u00e1n \u00c1d\u00e1m Mann, editors, Sicherheit, Schutz und Zuverl\u00e4ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022, LNI, pages 113\u2013126. Gesellschaft f\u00fcr Informatik e.V., 2022."},{"key":"e_1_3_2_1_15_1","first-page":"15","volume-title":"Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data (PaPoC@EuroSys","author":"Kleppmann Martin","year":"2022","unstructured":"Martin Kleppmann. Making CRDTs Byzantine fault tolerant. In Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data (PaPoC@EuroSys 2022), pages 8\u201315. ACM, 2022."},{"key":"e_1_3_2_1_16_1","volume-title":"Byzantine eventual consistency and the fundamental limits of peer-to-peer databases. arXiv preprint arXiv:2012.00472","author":"Kleppmann Martin","year":"2020","unstructured":"Martin Kleppmann and Heidi Howard. Byzantine eventual consistency and the fundamental limits of peer-to-peer databases. arXiv preprint arXiv:2012.00472, 2020."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_18_1","first-page":"388","volume-title":"Proceedings of the 4th Conference on Innovations in Theoretical Computer Science (ITCS","author":"Mahmoody Mohammad","year":"2013","unstructured":"Mohammad Mahmoody, Tal Moran, and Salil Vadhan. Publicly verifiable proofs of sequential work. In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science (ITCS 2013), pages 373\u2013388. ACM, 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf, 2008."},{"key":"e_1_3_2_1_20_1","first-page":"38","volume-title":"Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data, PaPoC '22","author":"Rault Pierre-Antoine","year":"2022","unstructured":"Pierre-Antoine Rault, Claudia-Lavinia Ignat, and Olivier Perrin. Distributed access control for collaborative applications using CRDTs. In Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data, PaPoC '22, page 33\u201338, New York, NY, USA, 2022. Association for Computing Machinery."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. ACM Program. Lang., 7(OOPSLA2)","author":"Renaux Thierry","year":"2023","unstructured":"Thierry Renaux, Sam Van den Vonder, and Wolfgang De Meuter. Secure RDTs: Enforcing access control policies for offline available JSON data. Proc. ACM Program. Lang., 7(OOPSLA2), October 2023."},{"key":"e_1_3_2_1_22_1","volume-title":"Ioannis Psaras. Merkle-CRDTs: Merkle-DAGs meet CRDTs","author":"Sanjuan Hector","year":"2020","unstructured":"Hector Sanjuan, Samuli Poyhtari, Pedro Teixeira, and Ioannis Psaras. Merkle-CRDTs: Merkle-DAGs meet CRDTs, 2020."},{"key":"e_1_3_2_1_23_1","volume-title":"Conflict-free replicated data types. Stabilization, Safety, and Security of Distributed Systems, 6976:386\u2013400","author":"Shapiro Marc","year":"2011","unstructured":"Marc Shapiro, Nuno Pregui\u00e7a, Carlos Baquero, and Marek Zawirski. Conflict-free replicated data types. Stabilization, Safety, and Security of Distributed Systems, 6976:386\u2013400, 2011."},{"key":"e_1_3_2_1_24_1","first-page":"97","volume-title":"Security and Trust Management","author":"Weber Mathias","year":"2016","unstructured":"Mathias Weber, Annette Bieniusa, and Arnd Poetzsch-Heffter. Access control for weakly consistent replicated information systems. In Gilles Barthe, Evangelos Markatos, and Pierangela Samarati, editors, Security and Trust Management, pages 82\u201397, Cham, 2016. Springer International Publishing."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447865.3457970"}],"event":{"name":"EuroSys '26: 21st European Conference on Computer Systems","location":"Edinburgh Scotland Uk","acronym":"PaPoC '26","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 13th International Workshop on Principles and Practice of Consistency for Distributed Data"],"original-title":[],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:41:47Z","timestamp":1776973307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3806077.3806698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,26]]},"references-count":25,"alternative-id":["10.1145\/3806077.3806698","10.1145\/3806077"],"URL":"https:\/\/doi.org\/10.1145\/3806077.3806698","relation":{},"subject":[],"published":{"date-parts":[[2026,4,26]]},"assertion":[{"value":"2026-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}