Filters








27 Hits in 6.5 sec

Classifying Trusted Hardware via Unidirectional Communication [article]

Naama Ben-David, Kartik Nayak
2021 arXiv   pre-print
The use of trusted hardware is a way to implement non-equivocation. Several different trusted hardware modules have been considered in the literature.  ...  It is well known that Byzantine fault tolerant (BFT) consensus cannot be solved in the classic asynchronous message passing model when one-third or more of the processes may be faulty.  ...  Q consists of at least t + 1 L1 proofs for (k, m) and each L1 proof consists of at least t + 1 matching copies of (k, m), signed by p.  ... 
arXiv:2105.10566v1 fatcat:a3qumtqdnfflro2ltaxlww26ce

The Impact of RDMA on Agreement

Marcos K. Aguilera, Naama Ben-David, Rachid Guerraoui, Virendra Marathe, Igor Zablotchi
2019 Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing - PODC '19  
In this paper, we study the fundamental power of these capabilities.  ...  Both algorithms tolerate a minority of memory failures inherent to RDMA, and they provide safety in asynchronous systems and liveness with standard additional assumptions.  ...  We wish to thank the anonymous reviewers for their helpful comments on improving the paper.  ... 
doi:10.1145/3293611.3331601 dblp:conf/podc/AguileraBGMZ19 fatcat:ijm6ini3lrahpgzvorlodnk6e4

Liar, Liar, Coins on Fire!

Tim Ruffing, Aniket Kate, Dominique Schröder
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
Non-equivocation contracts are particularly useful for distributed systems that employ public append-only logs to protect data integrity, e.g., in cloud storage and social networks.  ...  To this end, we design completely decentralized non-equivocation contracts, which make it possible to penalize an equivocating party by the loss of its money.  ...  Acknowledgments We thank Dario Fiore for insightful discussions on chameleon hash functions and the anonymous reviewers for their helpful suggestions and comments.  ... 
doi:10.1145/2810103.2813686 dblp:conf/ccs/RuffingKS15 fatcat:t7wt6x243rf6hhpo2vztl5szie

Mixed Fault Tolerance Protocols with Trusted Execution Environment [article]

Mingyuan Gao
2022 arXiv   pre-print
We identify two key principles for designing efficient MFT protocols, namely, (i) prioritizing non-equivocating nodes in leading the protocol, and (ii) advocating the use of public-key cryptographic primitives  ...  Blockchain systems are designed, built and operated in the presence of failures. There are two dominant failure models, namely crash fault and Byzantine fault.  ...  One one hand, nodes in these systems are likely to feature heterogenous machines, which are also subject to different maintainance or administration.  ... 
arXiv:2208.01946v1 fatcat:fkclfunqtrgvhn2qny4h7l2m7a

Distributed computing column 48

Idit Keidar
2012 ACM SIGACT News  
We would like to thank Srivatsan Ravi and Mykhailo Laremko for sharing their notes on the talks of the workshop.  ...  Acknowledgements We are grateful to the speakers, to the program committee members of WTTM 2012 for their help in reviewing this year's submissions and to Panagiota Fatourou for her help in the organization  ...  Moving to the malicious setting, the session on Byzantine Agreement analyzed the power of non-equivocation in reducing replication costs.  ... 
doi:10.1145/2421119.2421137 fatcat:qivpih26l5fp3ejfmium3bhfdu

SoK: Understanding BFT Consensus in the Age of Blockchains [article]

Gang Wang
2021 IACR Cryptology ePrint Archive  
The distributed system community has extensively studied the technical components of consensus to reach agreement among a group of nodes.  ...  Due to trust issues, it is hard to design a resilient system in practical situations because of the existence of various faults.  ...  This makes the system subject to attacks.  ... 
dblp:journals/iacr/Wang21c fatcat:wggbkbi25fg43fieebp4qzlk3m

SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments [article]

Ines Messadi, Markus Horst Becker, Kai Bleeke, Leander Jehl, Sonia Ben Mokhtar, Rüdiger Kapitza
2022 arXiv   pre-print
Byzantine fault-tolerant agreement (BFT) in a partially synchronous system usually requires 3f + 1 nodes to tolerate f faulty replicas.  ...  in could-based deployments of permissioned blockchains.  ...  This work was supported by the German Research Foundation (DFG) under grant no. KA 3171/9-1.  ... 
arXiv:2205.08938v2 fatcat:tvcdoeoe65ggvh2yhdjyowvj7q

Email communication in project management: A bane or a blessing?

Marius C. Smit, Taryn J. Bond-Barnard, Herman Steyn, Inger Fabris-Rotelli
2017 South African Journal of Information Management  
environments and the effect of email communication on feelings of stress and overload in the workplace.Method: A survey with 430 responses was conducted to determine the communication preferences of project  ...  The advent of email has significantly impacted the way the world communicates.Objectives: This study investigates the preference of email communication relative to other communication mediums in project  ...  Electronic media is generally believed to be leaner in richness and is preferred for non-equivocal tasks (Robert & Dennis 2005) .  ... 
doi:10.4102/sajim.v19i1.826 fatcat:iw6rev4i35dufaob6cr66f33wi

Small trusted primitives for dependable systems

Petros Maniatis, Byung-Gon Chun
2011 ACM SIGOPS Operating Systems Review  
Conservative design for such systems dictates that their security and fault tolerance depend on a very small number of assumptions taken on faith; such assumptions are typically called the "trusted computing  ...  We describe the benefits of using these primitives to increase the fault-tolerance of replicated systems and archival storage, and to improve the security of email SPAM and click-fraud prevention systems  ...  Acknowledgments: First and foremost we would like to acknowledge gratefully our co-authors in the work we survey here: Hari Balakrishnan, Ramakrishna Gummadi, John Kubiatowicz, and Scott Shenker.  ... 
doi:10.1145/1945023.1945038 fatcat:wycqymcve5aeflzpkcis4fdaey

The heuristics of nurse responsiveness to critical patient monitor and ventilator alarms in a private room neonatal intensive care unit

Rohan Joshi, Heidi van de Mortel, Loe Feijs, Peter Andriessen, Carola van Pul, Etsuro Ito
2017 PLoS ONE  
The aim of this study was to determine the factors that modulate nurse responsiveness to critical patient monitor and ventilator alarms in the context of a private room neonatal intensive care setting.  ...  Decreased nurse responsiveness and slow response times to alarms are the potentially dangerous consequences of alarm fatigue.  ...  Acknowledgments This research was performed within the framework of IMPULS perinatology. Author Contributions Conceptualization: Rohan Joshi, Heidi van de Mortel, Peter Andriessen, Carola van Pul.  ... 
doi:10.1371/journal.pone.0184567 pmid:28981515 pmcid:PMC5628801 fatcat:gyez4nwyljglbbdrglshhn2weq

Making Speculative BFT Resilient with Trusted Monotonic Counters [article]

Lachlan J. Gunn and Jian Liu and Bruno Vavala and N. Asokan
2019 arXiv   pre-print
Zyzzyva5 does not require a non-speculative fallback, but requires 5f + 1 replicas in order to tolerate f faults.  ...  We prove that SACZyzzyva is optimally robust and that trusted components cannot increase fault tolerance unless they are present in greater than two-thirds of replicas.  ...  Finally, in [13] it has been shown that achieving non-equivocation is actually insufficient for reducing the number of replicas, and that transferable authentication of messages (e.g., using digital  ... 
arXiv:1905.10255v2 fatcat:yammi3mp7vgszogbgix3nu26uu

Enig: Player Replaceable Finality Layers with Optimal Validity [article]

Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2022 IACR Cryptology ePrint Archive  
One is for partially synchronous networks and the other is for networks with periods of synchrony.  ...  We prove upper bounds on the achievable validity in partially synchronous networks and networks with periods of synchrony. Both our finality layers match these upper bounds.  ...  Let k be the number of equivocating parties in S. Then b has at least T−k prevotes from non-equivocating parties in its subtree. At most t − k of these are from corrupted parties.  ... 
dblp:journals/iacr/KampNTT22 fatcat:ogxsnd72gbaffiox7agdsoy6xy

Best Practices for Communication between Client and Vendor in IT Outsourcing Projects

Ravi S Sharma, Sr Apoorva, Venkata Madireddy, Varun Jain
2008 Journal of Information, Information Technology, and Organizations  
The objective of the study was to provide knowledge managers with an insight into the effectiveness of communication flows for various outsourcing activities in order to support knowledge mobilization  ...  The empirical study reported in this paper investigated the central postulate that effective management of technical communication at every stage of executing an IT outsourcing contract reduces associated  ...  At this phase of the research, we had intended to develop a model based on our belief system (defined by the 3 central postulates in Table 3 ) and allowed further investigation of some interesting research  ... 
doi:10.28945/131 fatcat:2d537rcxqfcbxctxgcwb2j6gbq

Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains [article]

Kai Li, Yuzhe Tang, Beom Heyn Kim, Jianliang Xu
2019 arXiv   pre-print
By experiments on private and public Ethereum testnets, we extensively evaluate the cost of the ContractChecker in comparison with that of existing client-based log auditing works.  ...  The result shows the ContractChecker can scale to hundreds of clients and save client costs by more than one order of magnitude.  ...  Blockchain is also used as the source of randomness [33] , non-equivocation log as in Catena [37] , etc. in many novel applications.  ... 
arXiv:1904.06626v3 fatcat:gtwta6iemfg65jrw6iep35juta

SmartCert: Redesigning Digital Certificates with Smart Contracts [article]

Pawel Szalachowski
2020 arXiv   pre-print
We present the implementation and evaluation of SmartCert, and discuss its deployability.  ...  In this work, we present SmartCert, a novel approach based on smart contracts to improve digital certificates.  ...  All systems in that class share the limitations of CT.  ... 
arXiv:2003.13259v1 fatcat:fh3gcmwu4rgkvjzuwmazefkb6a
« Previous Showing results 1 — 15 out of 27 results