Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Secure Data Replication over Previous: Limitations and Future Work

Bibliography

1
Secure Hash Standard.
FIPS 180-1, Secure Hash Standard, NIST, US Dept. of Commerce, Washington D. C. April 1995.

2
A. Bakker and M. van Steen and A. Tanenbaum.
A law-abiding peer-to-peer network for free-software distribution.
In Proc. Int'l Symp. on Network Computing and Applications, Cambridge, MA, Feb. 2002. IEEE.

3
M. Blaze.
A cryptographic file system for UNIX.
In ACM Conference on Computer and Communications Security, pages 9-16, 1993.

4
M. Castro and B. Liskov.
Practical byzantine fault tolerance.
In OSDI: Symposium on Operating Systems Design and Implementation, pages 173-186. USENIX Association, Co-sponsored by IEEE TCOS and ACM SIGOPS, 1999.

5
D. Mazieres and F. Kaashoek.
Escaping the evils of centralized control with self-certifying pathnames.
In In Proc. 8th ACM SIGOPS European Workshop, pages 118-125. ACM, 1998.

6
P. T. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. G. Stubblebine.
Flexible authentication of XML documents.
In ACM Conf. on Computer and Communications Security, pages 136-145, 2001.

7
K. Fu, M. F. Kaashoek, and D. Mazieres.
Fast and secure distributed read-only file system.
Computer Systems, 20(1):1-24, 2002.

8
M. F. Kaashoek, A. S. Tanenbaum, S. F. Hummel, and H. E. Bal.
An efficient reliable broadcast protocol.
Operating Systems Review, 23(4):5-19, 1989.

9
U. Maheshwari, R. Vingralek, and B. Shapiro.
How to build a trusted database system on untrusted storage.
In OSDI: 4th Symposium on Operating Systems Design and Implementation, pages 135-150. USENIX Association, Co-sponsored by IEEE TCOS and ACM SIGOPS, 2000.

10
D. Malkhi and M. K. Reiter.
Secure and scalable replication in Phalanx.
In Proc. 17th IEEE Symposium on Reliable Distributed Systems, pages 51-58. IEEE, 1998.

11
D. Mazieres and D. Shasha.
Building secure file systems out of byzantine storage.
In Proc. of the 21st Annual Symposium on Principles of Distributed Computing, pages 108-117, Monterey, CA, 2002. ACM.

12
R. C. Merkle.
A certified digital signature.
In Proc. Crypto '89, LNCS 435, pages 234-246. Springer-Verlag, 1989.

13
E. L. Miller, W. E. Freeman, D. D. E. Long, and B. C. Reed.
Strong security for network-attached storage.
In USENIX Conference on File and Storage Technologies (FAST), pages 1-14, Jan. 2002.

14
M. Naor and K. Nissim.
Certificate revocation and certificate update.
In Proceedings 7th USENIX Security Symposium, Jan 1998.

15
M. K. Reiter.
The Rampart toolkit for building high-integrity services.
In Lecture Notes in Computer Science, volume 938, pages 99-110. Springer-Verlag, Berlin Germany, 1995.

16
F. B. Schneider.
Implementing fault-tolerant services using the state machine approach: A tutorial.
ACM Computing Surveys, 22(4):299-319, Dec. 1990.

17
L. Zhou, F. Schneider, and R. van Renesse.
COCA: A secure distributed online certification authority.
ACM Transactions on Computer Systems, 20(4):329-368, 2002.



Popescu Bogdan
2003-06-11