Next: About this document ...
Up: The Phoenix Recovery System:
Previous: Conclusions
- 1
-
C. Batten, K. Barr, A. Saraf, and S. Treptin.
pStore: A secure peer-to-peer backup system.
Unpublished report, Dec. 2001.
- 2
-
L. P. Cox and B. D. Noble.
Pastiche: Making backup cheap and easy.
In Proceedings of Fifth USENIX Symposium on Operating Systems
Design and Implementation, Boston, MA, Dec. 2002.
- 3
-
F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica.
Wide-area cooperative storage with CFS.
In proceedings of the 18th ACM Symposium on Operating System
Principles (SOSP) , Oct. 2001.
- 4
-
Datathought website.
https://www.datathought.com.
- 5
-
F. Junqueira and K. Marzullo.
Synchronous Consensus for dependent process failures.
In Proceedings of the ICDCS 2003, pages 274-283, May 2003.
- 6
-
D. Moore, C. Shannon, and J. Brown.
Code-Red: A case study on the spread and victims of an Internet
worm.
In Proceedings of the 2002 ACM SICGOMM Internet Measurement
Workshop, pages 273-284, Marseille, France, Nov. 2002.
- 7
-
National Institute of Standards and Technology (NIST).
ICAT vulnerability database.
https://icat.nist.gov/icat.cfm.
- 8
-
OneStat.com.
Provider of web analytics.
https://www.onestat.com.
- 9
-
Protect-data website.
https://www.protect-data.com.
- 10
-
F. B. Schneider.
Implementing fault-tolerant services using the state machine
approach: A tutorial.
ACM Computing Surveys, Dec. 1990.
- 11
-
SecurityFocus.
Vulnerability database.
https://securityfocus.com.
2003-06-20