How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
Asynchronous verifiable secret sharing and proactive cryptosystems
Proceedings of the 9th ACM conference on Computer and communications security
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Some Recent Research Aspects of Threshold Cryptography
ISW '97 Proceedings of the First International Workshop on Information Security
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
APSS: proactive secret sharing in asynchronous systems
ACM Transactions on Information and System Security (TISSEC)
Proactive resilience through architectural hybridization
Proceedings of the 2006 ACM symposium on Applied computing
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
The FOREVER service for fault/intrusion removal
Proceedings of the 2nd workshop on Recent advances on intrusiton-tolerant systems
Functional decomposition and interactions in hybrid intrusion-tolerant systems
Proceedings of the 3rd International DiscCoTec Workshop on Middleware-Application Interaction
Proactive Fortification of Fault-Tolerant Services
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Adaptare: Supporting automatic and dependable adaptation in dynamic environments
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
A node-exhaustion-safe intrusion-tolerant distributed system is a system that assuredly does not suffer more than the assumed number of node failures. In a recent work, we showed that it is not possible to build any type of node-exhaustion-safe distributed f intrusion-tolerant system under the asynchronous model. Some years ago, an intuition about this problem motivated the research around proactive recovery, which made possible the appearance of asynchronous systems that allegedly can tolerate any number of faults over the lifetime of the system. In this paper, each of these works is analyzed in detail and is explained why they fail to achieve their goal. Afterwards, we summarize the four problems that may affect systems employing proactive recovery.