Next: About this document ...
Up: Secure Data Replication over
Previous: Limitations and Future Work
- 1
-
Secure Hash Standard.
FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce,
Washington D. C. April 1995.
- 2
-
A. Bakker and M. van Steen and A. Tanenbaum.
A law-abiding peer-to-peer network for free-software distribution.
In Proc. Int'l Symp. on Network Computing and Applications,
Cambridge, MA, Feb. 2002. IEEE.
- 3
-
M. Blaze.
A cryptographic file system for UNIX.
In ACM Conference on Computer and Communications Security,
pages 9-16, 1993.
- 4
-
M. Castro and B. Liskov.
Practical byzantine fault tolerance.
In OSDI: Symposium on Operating Systems Design and
Implementation, pages 173-186. USENIX Association, Co-sponsored by IEEE
TCOS and ACM SIGOPS, 1999.
- 5
-
D. Mazieres and F. Kaashoek.
Escaping the evils of centralized control with self-certifying
pathnames.
In In Proc. 8th ACM SIGOPS European Workshop, pages 118-125.
ACM, 1998.
- 6
-
P. T. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. G.
Stubblebine.
Flexible authentication of XML documents.
In ACM Conf. on Computer and Communications Security, pages
136-145, 2001.
- 7
-
K. Fu, M. F. Kaashoek, and D. Mazieres.
Fast and secure distributed read-only file system.
Computer Systems, 20(1):1-24, 2002.
- 8
-
M. F. Kaashoek, A. S. Tanenbaum, S. F. Hummel, and H. E. Bal.
An efficient reliable broadcast protocol.
Operating Systems Review, 23(4):5-19, 1989.
- 9
-
U. Maheshwari, R. Vingralek, and B. Shapiro.
How to build a trusted database system on untrusted storage.
In OSDI: 4th Symposium on Operating Systems Design and
Implementation, pages 135-150. USENIX Association, Co-sponsored by IEEE
TCOS and ACM SIGOPS, 2000.
- 10
-
D. Malkhi and M. K. Reiter.
Secure and scalable replication in Phalanx.
In Proc. 17th IEEE Symposium on Reliable Distributed Systems,
pages 51-58. IEEE, 1998.
- 11
-
D. Mazieres and D. Shasha.
Building secure file systems out of byzantine storage.
In Proc. of the 21st Annual Symposium on Principles of
Distributed Computing, pages 108-117, Monterey, CA, 2002. ACM.
- 12
-
R. C. Merkle.
A certified digital signature.
In Proc. Crypto '89, LNCS 435, pages 234-246. Springer-Verlag,
1989.
- 13
-
E. L. Miller, W. E. Freeman, D. D. E. Long, and B. C. Reed.
Strong security for network-attached storage.
In USENIX Conference on File and Storage Technologies (FAST),
pages 1-14, Jan. 2002.
- 14
-
M. Naor and K. Nissim.
Certificate revocation and certificate update.
In Proceedings 7th USENIX Security Symposium, Jan 1998.
- 15
-
M. K. Reiter.
The Rampart toolkit for building high-integrity services.
In Lecture Notes in Computer Science, volume 938, pages
99-110. Springer-Verlag, Berlin Germany, 1995.
- 16
-
F. B. Schneider.
Implementing fault-tolerant services using the state machine
approach: A tutorial.
ACM Computing Surveys, 22(4):299-319, Dec. 1990.
- 17
-
L. Zhou, F. Schneider, and R. van Renesse.
COCA: A secure distributed online certification authority.
ACM Transactions on Computer Systems, 20(4):329-368, 2002.
Popescu Bogdan
2003-06-11