Filters








3,862 Hits in 4.2 sec

Beernet

B. Mejías, P. Van Roy
2010 International Journal of Adaptive, Resilient and Autonomic Systems  
However, their complexity is higher due to the lack of a single point of control and synchronization, and because consistent decentralized storage is difficult to maintain when data constantly evolves.  ...  Distributed systems with a centralized architecture present the well known problems of single point of failure and single point of congestion. Therefore, they do not scale.  ...  The relaxed-ring deals with non-transitive connectivity, making it suitable for Internet applications.  ... 
doi:10.4018/jaras.2010070101 fatcat:of5pt4kddbhxhddgunxv2zp2ly

Binding of Endpoints to Identifiers by On-Chain Proofs [article]

Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini
2020 arXiv   pre-print
In this paper, we show two DLT-based protocols to prove the association between a subject and an endpoint in a decentralized manner, contributing in filling the gap of the current IdM approaches with respect  ...  Our protocols are compatible with a wide variety of endpoints. We analyze the security of our protocols and evaluate their performance and cost against the common approaches.  ...  Suppose that b is the hash of the block in which the certification request R is committed. We use b as a shared source of randomness.  ... 
arXiv:2005.00794v1 fatcat:3yauleviwzcwjppyk55la5v2j4

Zerocoin: Anonymous Distributed E-Cash from Bitcoin

I. Miers, C. Garman, M. Green, A. D. Rubin
2013 2013 IEEE Symposium on Security and Privacy  
In this paper we propose Zerocoin, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions.  ...  We detail Zerocoin's cryptographic construction, its integration into Bitcoin, and examine its performance both in terms of computation and impact on the Bitcoin protocol.  ...  The research in this paper was supported in part by the Office of Naval Research under contract N00014-11-1-0470, and DARPA and the Air Force Research Laboratory (AFRL) under contract FA8750-11-2-0211.  ... 
doi:10.1109/sp.2013.34 dblp:conf/sp/MiersG0R13 fatcat:m2igvwzckrffhhl7qnlhms4rga

Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT

Igor M. Coelho, Vitor N. Coelho, Rodolfo P. Araujo, Wang Y. Qiang, Brett D. Rhodes
2020 Future Internet  
This paper presents the pioneer Delegated Byzantine Fault Tolerance (dBFT) protocol of Neo Blockchain, which was inspired by the Practical Byzantine Fault Tolerance (PBFT).  ...  Besides introducing its history, this study describes proofs and didactic examples, as well as novel design and extensions for Neo dBFT with multiple block proposals.  ...  If a non-faulty replica committed on view v, it means that 2 f + 1 agreed, meaning that at least f + 1 non-faulty nodes agree (they have all block transactions, which are valid).  ... 
doi:10.3390/fi12080129 fatcat:hk63eean5ndc7jricbzvtdgs5y

A Comparative Performance Evaluation of Different Implementations of the SOAP Protocol

Jose A. Garcia, Roi Blanco, Antonio Blanco, Javier Paris
2007 Fifth European Conference on Web Services (ECOWS'07)  
Correctness of the concurrent execution then has to be ensured by commit order-preserving transaction schedulers.  ...  For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions.  ...  process is always a non-blocking schedule.  ... 
doi:10.1109/ecows.2007.16 dblp:conf/ecows/GarciaBBP07 fatcat:uxkgpc7e3jagvjtekyl5ewopni

Nonblocking Scheduling for Web Service Transactions

Mohammad Alrifai, Wolf-Tilo Balke, Peter Dolog, Wolfgang Nejdl
2007 Fifth European Conference on Web Services (ECOWS'07)  
Correctness of the concurrent execution then has to be ensured by commit order-preserving transaction schedulers.  ...  For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions.  ...  process is always a non-blocking schedule.  ... 
doi:10.1109/ecows.2007.15 dblp:conf/ecows/AlrifaiBDN07 fatcat:ldzrctnqxjhsfed37bejksxa3m

Dragoon: Private Decentralized HITs Made Practical [article]

Yuan Lu, Qiang Tang, Guiling Wang
2020 arXiv   pre-print
We present a practical decentralized protocol for HITs, which also achieves the fairness between requesters and workers.  ...  By various non-trivial statement reformations, proving the quality of encrypted data is reduced to efficient verifiable decryption, thus making decentralized HITs practical.  ...  We would like to thank the anonymous reviewers for their valuable suggestions and comments about this paper.  ... 
arXiv:2003.10074v3 fatcat:5uq3ya6plngalkbbuhdswkr35y

Privacy-Preserving Decentralized Exchange Marketplaces [article]

Kavya Govindarajan, Dhinakaran Vinayagamurthy, Praveen Jayachandran, Chester Rebeiro
2021 arXiv   pre-print
We define formal security notions and present a security analysis of the marketplace.  ...  Decentralized exchange markets leveraging blockchain have been proposed recently to provide open and equal access to traders, improve transparency and reduce systemic risk of centralized exchanges.  ...  non-privacy preserving, but decentralized protocol variants 15 (the distribution of prices does not impact performance).  ... 
arXiv:2111.15259v2 fatcat:hl2dyln5l5cmjjlae4kxmqlzy4

Confidentiality-preserving Validation of Tax Documents on the Blockchain [chapter]

Filip Fatz, German Research Center for Artificial Intelligence, Institute for Information Systems, Saarbrücken, German, Philip Hake, Peter Fettke
2020 WI2020 Zentrale Tracks  
Therefore, organizations proposed the application of blockchain technology to interconnect the different actors and increase tax transparency.  ...  However, the lack of confidentiality measures hampers further development.  ...  This work was conducted within a project partly sponsored by the German Ministry for Education and Research (BMBF), project name ProcessChain, support code 01IS17086B.  ... 
doi:10.30844/wi_2020_l1-fatz dblp:conf/wirtschaftsinformatik/FatzHF20 fatcat:2n4l6b5aavck3pjfhdwmrewfsa

Consensus in the Age of Blockchains [article]

Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis
2017 arXiv   pre-print
What distinguishes blockchains from traditional distributed databases is the ability to operate in a decentralized setting without relying on a trusted third party.  ...  The inherent complexity of consensus protocols and their rapid and dramatic evolution makes it hard to contextualize the design landscape.  ...  The XFT [94] protocol, on the other hand, improves the efficiency of consensus by relaxing the threat model.  ... 
arXiv:1711.03936v2 fatcat:va2pvautcvf4zdt5marnsornvi

Consensus Crash Testing: Exploring Ripple's Decentralization Degree in Adversarial Environments

Klitos Christodoulou, Elias Iosif, Antonios Inglezakis, Marinos Themistocleous
2020 Future Internet  
The main experimental finding suggests that, when a low percentage of malicious nodes is present, the centralization degree of the network can be significantly relaxed ensuring low convergence times.  ...  The main contribution of this work deals with observations from experimenting with Ripple's consensus protocol as it is embodied in the XRP Ledger.  ...  Acknowledgments: We thank George Giaglis, Executive Director at the Institute For the Future (IFF), for his assistance with the methodology section of the paper and for the valuable comments that greatly  ... 
doi:10.3390/fi12030053 fatcat:ynjbib7qhvfjvboegdluxofqhm

A Performance Evaluation of g-Bound with a Consistency Protocol Supporting Multiple Isolation Levels [chapter]

R. Salinas, F. D. Muñoz-Escoí, J. E. Armendáriz-Iñigo, J. R. González de Mendívil
2008 Lecture Notes in Computer Science  
This protocol is able to concurrently execute Generalized Read Committed (GRC), GSI, g-Bound -a non-standard SI level limiting the outdatedness of transactions wanting to commit-and optimistic SSI transactions  ...  Instead, distributed databases usually offer Generalized Snapshot Isolation (GSI), a more relaxed level, in which a transaction may get a snapshot older than the one that was applied on the database by  ...  This new protocol offers an optimistic, non-blocking SSI, which is, as far as we are aware, the first implementation of a practical SSI replication protocol in a middleware system.  ... 
doi:10.1007/978-3-540-88875-8_117 fatcat:sc5fxvxeovehbcbfvxqn36pnpa

Mind the Gap: Trade-Offs between Distributed Ledger Technology Characteristics [article]

Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev
2020 arXiv   pre-print
The main purpose of our article is to introduce scientific and practical audiences to the intricacies of DLT designs and to support development of viable applications on DLT.  ...  When developing peer-to-peer applications on Distributed Ledger Technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum) because it is hard to change the underlying  ...  In particular, we would like to thank Mikael Beyene and Konstantin Pandl for taking the time to discuss the trade-offs based on the archetypes and selected DLT designs.  ... 
arXiv:1906.00861v4 fatcat:s6wcshvscraobgow67mqf4ogjy

Trustworthy Edge Computing through Blockchains [article]

Abdullah Al-Mamun, Dongfang Zhao
2020 arXiv   pre-print
This paper proposes a cooperative protocol, namely DEAN, across edge nodes to prevent data manipulation, and to allow fair data sharing with quick recovery under resource constraints of limited storage  ...  Specifically, DEAN leverages a parallel mechanism equipped with three independent core components, effectively achieving low resource consumption while allowing secured parallel block processing on edge  ...  As demonstrated in [25] , there are two necessary and sufficient conditions to ensure a non-blocking protocol: C1 There is no such a state from which we can make a decision between commit and abort.  ... 
arXiv:2005.07741v1 fatcat:ivxef3bgmbdrdahyqgb2u7qhxm

A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks

Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen, Dong In Kim
2019 IEEE Access  
Finally, we discuss several open issues in the protocol design for blockchain consensus and the related potential research directions.  ...  By emphasizing the unique characteristics of incentivized consensus in blockchain networks, our in-depth review of the state-of-the-art consensus protocols is focused on both the perspective of distributed  ...  ACKNOWLEDGMENT The ASEAN IVO (http://www.nict.go.jp/en/asean_ivo) project Cyberattack Detection and Information Security for Industry 4.0 was also involved in the production of the contents of this work  ... 
doi:10.1109/access.2019.2896108 fatcat:sgldb5225zgbblapruvsz2gdky
« Previous Showing results 1 — 15 out of 3,862 results