Filters








62 Hits in 6.8 sec

How to Trust Strangers: Composition of Byzantine Quorum Systems [article]

Orestis Alpos, Christian Cachin, Luca Zanolini
2021 arXiv   pre-print
Reaching consensus with asymmetric trust in the model of personal Byzantine quorum systems (Losa et al., DISC 2019) was shown to be impossible, if the trust assumptions of the processes diverge from each  ...  With asymmetric quorum systems, and by applying our composition rule, we show how consensus is actually possible, even with the combination of disjoint sets of processes.  ...  We show how to join together two or more systems in a way where processes in one system do not need a complete knowledge of the trust assumptions of those in the other.  ... 
arXiv:2107.11331v1 fatcat:pdp7twlfzrf6rbs46cprfyafoq

How to Trust Strangers: Composition of Byzantine Quorum Systems

Orestis Alpos, Christian Cachin, Luca Zanolini
2021
Reaching consensus with asymmetric trust in the model of personal Byzantine quorum systems (Losa et al., DISC 2019) was shown to be impossible, if the trust assumptions of the processes diverge from each  ...  With asymmetric quorum systems, and by applying our composition rule, we show how consensus is actually possible, even with the combination of disjoint sets of processes.  ...  We show how to join together two or more systems in a way where processes in one system do not need a complete knowledge of the trust assumptions of those in the other. 2.  ... 
doi:10.48350/165017 fatcat:ncifck2ujbbhplsl6dcqvhkjxe

Brief Announcement: How to Trust Strangers - Composition of Byzantine Quorum Systems

Orestis Alpos, Christian Cachin, Luca Zanolini, Seth Gilbert
2021
Reaching consensus with asymmetric trust in the model of personal Byzantine quorum systems (Losa et al., DISC 2019) was shown to be impossible, if the trust assumptions of the processes diverge from each  ...  With asymmetric quorum systems, and by applying our composition rule, we show how consensus is actually possible, even with the combination of disjoint sets of processes.  ...  We show how to join together two or more systems in a way where processes in one system do not need a complete knowledge of the trust assumptions of those in the other. 2.  ... 
doi:10.4230/lipics.disc.2021.44 fatcat:zbci76dn2ne2baqwyocfrxaeim

Brief Announcement: How to Trust Strangers - Composition of Byzantine Quorum Systems

Orestis Alpos, Christian Cachin, Luca Zanolini, Seth Gilbert
2021
Reaching consensus with asymmetric trust in the model of personal Byzantine quorum systems (Losa et al., DISC 2019) was shown to be impossible, if the trust assumptions of the processes diverge from each  ...  With asymmetric quorum systems, and by applying our composition rule, we show how consensus is actually possible, even with the combination of disjoint sets of processes.  ...  [4] , and Cachin and Tackmann [2] extend Byzantine quorum systems to permit subjective trust by introducing asymmetric Byzantine quorum systems.  ... 
doi:10.48350/165015 fatcat:yp63wbhjdffa3dodjw772mgpgu

Table of Contents

2021 2021 40th International Symposium on Reliable Distributed Systems (SRDS)  
Yu (Monash University), and Paulo Esteves-Verissimo (King Abdullah University of Science and Technology) How to Trust Strangers: Composition of Byzantine Quorum Systems 120 Orestis Alpos (University of  ...  Bern, Switzerland), Christian Cachin (University of Bern, Switzerland), and Luca Zanolini (University of Bern, Switzerland) Threat Adaptive Byzantine Fault Tolerant State-Machine Replication 78 Douglas  ... 
doi:10.1109/srds53918.2021.00004 fatcat:3b6eskjuwnfphflv2z2osoo7uq

KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability [article]

Clinton Ehrlich, Anna Guzova
2020 arXiv   pre-print
This paper applies biomimetic engineering to the problem of permissionless Byzantine consensus and achieves results that surpass the prior state of the art by four orders of magnitude.  ...  Second, it demonstrates how two previously overlooked exploits, book-prize attacks and pseudo-transfer attacks, collectively undermine the security guarantees of all prior permissionless ledgers.  ...  If the composition of the total population remains constant, then the set of agents who can trust the protocol at its inception will be identical to the set of agents who can trust the protocol in all  ... 
arXiv:1909.07433v4 fatcat:rmjnu6ktv5fu7hqjcakzghio2y

Performance Improvement Techniques for Customized Data Warehouse

Md. Al Mamun
2013 IOSR Journal of Computer Engineering  
Fig 1 represents the system architecture. III. Data Retrieval Time We have designed an algorithm for determining data retrieval time for relational database system and DW database system [6].  ...  Table 5 represents the data retrieval time of executing a query on data tables of various sizes containing records of up to 4 millions using RDBMS and the corresponding records in DW.  ...  This work was can be done in part of in our institution and support of all staff members.  ... 
doi:10.9790/0661-0930105 fatcat:ds3t4hys75fdpnsne4mu77i67y

C3P: A Re-Configurable Framework to DesignCycle-sharing Computing Cloud Platforms

Sérgio Esteves, Paulo Ferreira, Luís Veiga
2015 Computer journal  
C 3 P evaluation shows that any ordinary Internet user is able to easily and effectively take advantage of remote resources, namely CPU cycles, for their own benefit; or provide spare cycles to other users  ...  Despite the already extensive study in the field of Grid and Cloud computing, no solution was ever successful in reaching out to typical home users and their resource-intensive commodity applications.  ...  Ribeiro and João Nuno Silva for their teamwork during the various stages of this work.  ... 
doi:10.1093/comjnl/bxv012 fatcat:flnquo2pufarvdm2v3hl3k3cam

Robust decentralized authentication for public keys and geographic location

Vivek Pathak
2009
Our byzantine fault tolerant public-key authentication protocol (BPKA) provides decentralized authentication to peer-to-peer systems with honest majority.  ...  In the security infrastructure approach, a central trusted authority takes on the responsibility of authenticating participants within its domain of control.  ...  Since it allows the autonomous lightweight mutual authentication of strangers, BPKA is well suited for the authentication needs of peer-to-peer systems.  ... 
doi:10.7282/t3g1613t fatcat:vf5czvah7ncb3flkpszvpwrvsq

Locality driven key management architecture for mobile ad-hoc networks

Gang Xu, L. Iftode
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)  
A certificate service is effective if it can react to changes of trust in the system in time.  ...  When F begins to trust G, it triggers chain update new CA certificate describing the new composition. along the reverse path of the trust chain step by step.  ... 
doi:10.1109/mahss.2004.1392183 dblp:conf/mass/XuI04 fatcat:6b75cbcabvcuhmlpl66vdolnr4

Supply chain finance through a blockchain lens

Anadi Pandharkar
2020
A JavaScript-based unit test is done to test the smart contract's correct deployment and onboarding of actors along with their business and financing interactions – access controls to business documents  ...  However, because of the new Basel III regulation framework for banks and several other Supply Chain Finance (SCF) adoption barriers, like fraudulent activities, many firms are unable to reap SCF's full  ...  In the case of a centralized system, the trust is levied upon the central authority but in a decentralized and distributed system, such single bearer of the trust is absent.  ... 
doi:10.14288/1.0394745 fatcat:h66p2odfwrevvevqmuk4vsb6py

Appendix: Proceedings of the Twenty-Fifth Annual Session, Chicago, Ill., 1893

1893 Transactions of the American Philological Association (1869-1896)  
Philocrates assures him that he will be true to the trust reposed in him.  ...  taught nowadays to model his prose composition on the law of the Attic orators. oavv dead ?  ...  , it is sure to be permanently valuable for the history of American scholarship.  ... 
doi:10.2307/2935738 fatcat:updag4wd6fawdnr6z6xq5ex7sa

Sharers in the Contemplative Virtue: Julianus Pomerius's Carolingian Audience

Josh Timmermann
2014 Comitatus: A Journal of Medieval and Renaissance Studies  
transformation in the bishops' own system of values.  ...  We would also have to temporarily eliminate Jonas from the composition of this chapter, in order to make this scenario truly plausible.  ... 
doi:10.1353/cjm.2014.0029 fatcat:q2sun4qjivec7bhymkf6u2bbnu

Trust-aware business processes with distributed ledger technologies [article]

Marcel Müller, Technische Universität Berlin, Axel Küpper
2021
Thus, the outcomes of this thesis foster a deep understanding of trust in business processes and how distributed ledger technologies can be utilized as a tool to mitigate trust issues.  ...  These trust patterns are classified with a taxonomy that helps to identify their trust-enhancing capabilities.  ...  is the second part of the composite trust subject.  ... 
doi:10.14279/depositonce-12504 fatcat:4fltf3bnxzg4rfzx4tdaqk7fla

Rhetoric: Selected Readings of Classical Writings for its Theory, History, and Application

Fee-Alexandra Haase
2009 Social Science Research Network  
Where the master presses forward, the servant, no matter how good his intentions, cannot save him. Nine in the third place means: Keeping his hips still. Making his sacrum stiff. Dangerous.  ...  Doing good refers either to the preservation of life and the means of life, or to wealth, or to some other of the good things which it is hard to get either always or at that particular place or time-for  ...  The ways in which to make them trust the goodness of other people are also the ways in which to make them trust our own.  ... 
doi:10.2139/ssrn.1347745 fatcat:6xualpw3kffzdapjpecgoodguu
« Previous Showing results 1 — 15 out of 62 results