Check out the new USENIX Web site. next up previous
Next: About this document ... Up: The Phoenix Recovery System: Previous: Conclusions

Bibliography

1
C. Batten, K. Barr, A. Saraf, and S. Treptin.
pStore: A secure peer-to-peer backup system.
Unpublished report, Dec. 2001.

2
L. P. Cox and B. D. Noble.
Pastiche: Making backup cheap and easy.
In Proceedings of Fifth USENIX Symposium on Operating Systems Design and Implementation, Boston, MA, Dec. 2002.

3
F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica.
Wide-area cooperative storage with CFS.
In proceedings of the 18th ACM Symposium on Operating System Principles (SOSP) , Oct. 2001.

4
Datathought website.
https://www.datathought.com.

5
F. Junqueira and K. Marzullo.
Synchronous Consensus for dependent process failures.
In Proceedings of the ICDCS 2003, pages 274-283, May 2003.

6
D. Moore, C. Shannon, and J. Brown.
Code-Red: A case study on the spread and victims of an Internet worm.
In Proceedings of the 2002 ACM SICGOMM Internet Measurement Workshop, pages 273-284, Marseille, France, Nov. 2002.

7
National Institute of Standards and Technology (NIST).
ICAT vulnerability database.
https://icat.nist.gov/icat.cfm.

8
OneStat.com.
Provider of web analytics.
https://www.onestat.com.

9
Protect-data website.
https://www.protect-data.com.

10
F. B. Schneider.
Implementing fault-tolerant services using the state machine approach: A tutorial.
ACM Computing Surveys, Dec. 1990.

11
SecurityFocus.
Vulnerability database.
https://securityfocus.com.



2003-06-20