The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Free Riding on Gnutella Revisited: The Bell Tolls?
IEEE Distributed Systems Online
BAR fault tolerance for cooperative services
Proceedings of the twentieth ACM symposium on Operating systems principles
When selfish meets evil: byzantine players in a virus inoculation game
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
Lower bounds on implementing robust and resilient mediators
TCC'08 Proceedings of the 5th conference on Theory of cryptography
FlightPath: obedience vs. choice in cooperative services
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
It's on me! the benefit of altruism in BAR environment
DISC'10 Proceedings of the 24th international conference on Distributed computing
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
What's a little collusion between friends?
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Hi-index | 0.00 |
While the setting of this question may appear implausible, this is precisely the environment in which services that span multiple administrative domains (MAD) must function. In such services--which include applications such as content dissemination (e.g.., [2]), file backup (e.g., [6]), volunteer computing (e.g., [5]),multihop wireless networking (e.g., [4]), and Internet routing--resources are not under the control of a single administrative domain, so the necessary cooperation cannot simply be achieved by fiat. Instead, it is imperative that the service be structured so that nodes--which are administered by different, potentially selfish entities--have an incentive to help sustain it. Indeed, such issues are not imaginary: ample evidence suggests that a large number of peers will free-ride or deviate from the assigned protocol if it is in their interest to do so (e.g., [3,9,16,21]).