Up:Contents Previous:Conclusions

Bibliography

1
M. Bellare and D. Micciancio.
A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost. In Advances in Cryptology - EUROCRYPT, 1997.
2
J. Black et al.
UMAC: Fast and Secure Message Authentication. In Advances in Cryptology - CRYPTO, 1999.
3
R. Canetti, S. Halevi, and A. Herzberg.
Maintaining Authenticated Communication in the Presence of Break-ins. In ACM Conference on Computers and Communication Security, 1997.
4
M. Castro.
Practical Byzantine Faul Tolerance. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, 2000. In preparation.
5
M. Castro and B. Liskov.
A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm. Technical Memo MIT/LCS/TM-590, MIT Laboratory for Computer Science, 1999.
6
M. Castro and B. Liskov.
Practical Byzantine Fault Tolerance. In USENIX Symposium on Operating Systems Design and Implementation, 1999.
7
C. Collberg and C. Thomborson.
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. Technical Report 2000-03, University of Arizona, 2000.
8
S. Floyd et al.
A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing. IEEE/ACM Transactions on Networking, 5(6), 1995.
9
S. Forrest et al.
Building Diverse Computer Systems. In Proceedings of the 6th Workshop on Hot Topics in Operating Systems, 1997.
10
J. Garay et al.
Secure Distributed Storage and Retrieval. Theoretical Computer Science, to appear.
11
L. Gong.
A Security Risk of Depending on Synchronized Clocks. Operating Systems Review, 26(1):49-53, 1992.
12
M. Herlihy and J. Wing.
Axioms for Concurrent Objects. In ACM Symposium on Principles of Programming Languages, 1987.
13
A. Herzberg et al.
Proactive Secret Sharing, Or: How To Cope With Perpetual Leakage. In Advances in Cryptology - CRYPTO, 1995.
14
A. Herzberg et al.
Proactive Public Key and Signature Systems. In ACM Conference on Computers and Communication Security, 1997.
15
J. Howard et al.
Scale and Performance in a Distributed File System. ACM Transactions on Computer Systems, 6(1), 1988.
16
K. Kihlstrom, L. Moser, and P. Melliar-Smith.
The SecureRing Protocols for Securing Group Communication. In Hawaii International Conference on System Sciences, 1998.
17
L. Lamport.
Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7), 1978.
18
L. Lamport.
The Part-Time Parliament. Technical Report 49, DEC Systems Research Center, 1989.
19
B. Liskov et al.
Replication in the Harp File System. In ACM Symposium on Operating System Principles, 1991.
20
D. Malkhi and M. Reiter.
Secure and Scalable Replication in Phalanx. In IEEE Symposium on Reliable Distributed Systems, 1998.
21
D. Maziéres et al.
Separating Key Management from File System Security. In ACM Symposium on Operating System Principles, 1999.
22
Ron Minnich.
The Linux BIOS Home Page. http://www.acl.lanl.gov/linuxbios, 2000.
23
B. Oki and B. Liskov.
Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems. In ACM Symposium on Principles of Distributed Computing, 1988.
24
R. Ostrovsky and M. Yung.
How to Withstand Mobile Virus Attacks. In ACM Symposium on Principles of Distributed Computing, 1991.
25
J. Ousterhout.
Why Aren't Operating Systems Getting Faster as Fast as Hardware? In USENIX Summer, 1990.
26
M. Reiter.
The Rampart Toolkit for Building High-Integrity Services. Theory and Practice in Distributed Systems (LNCS 938), 1995.
27
R. Rivest.
The MD5 Message-Digest Algorithm. Internet RFC-1321, 1992.
28
F. Schneider.
Implementing Fault-Tolerant Services Using The State Machine Approach: A Tutorial. ACM Computing Surveys, 22(4), 1990.


Miguel Castro and Barbara Liskov, "Proactive Recovery in a Byzantine-Fault-Tolerant System", in Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, San Diego, USA, October 2000.