Reliable communication in the presence of failures
ACM Transactions on Computer Systems (TOCS)
Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
Using process groups to implement failure detection in asynchronous environments
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Tolerating failures of continuous-valued sensors
ACM Transactions on Computer Systems (TOCS)
Lightweight causal and atomic group multicast
ACM Transactions on Computer Systems (TOCS)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
VAXcluster: a closely-coupled distributed system
ACM Transactions on Computer Systems (TOCS)
Fault-tolerant broadcasts and related problems
Distributed systems (2nd Ed.)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Fault-tolerance in the advanced automation system
EW 4 Proceedings of the 4th workshop on ACM SIGOPS European workshop
Reliable Multicast between Micro-Kernels
Proceedings of the Workshop on Micro-kernels and Other Kernel Architectures
The Rampart Toolkit for Building High-Integrity Services
Selected Papers from the International Workshop on Theory and Practice in Distributed Systems
On the Impossibility of Group Membership
On the Impossibility of Group Membership
USTAT: A Real-Time Intrusion Detection System for UNIX
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Distributing trust with the Rampart toolkit
Communications of the ACM
A Configurable Membership Service
IEEE Transactions on Computers
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing
Group communication specifications: a comprehensive study
ACM Computing Surveys (CSUR)
The SecureRing group communication system
ACM Transactions on Information and System Security (TISSEC)
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
Guest Editorial: Introduction to the Special Section
IEEE Transactions on Software Engineering
k-anonymous message transmission
Proceedings of the 10th ACM conference on Computer and communications security
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A communication model for structural design objects. II: performatives and protocols
Advances in Engineering Software
ACM Transactions on Information and System Security (TISSEC)
Fireflies: scalable support for intrusion-tolerant network overlays
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Worm-IT - A wormhole-based intrusion-tolerant group communication system
Journal of Systems and Software
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A communication model for structural design objects. II: Performatives and protocols
Advances in Engineering Software
Census: location-aware membership management for large-scale distributed systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Aggregation for implicit invocations
Proceedings of the 12th annual international conference on Aspect-oriented software development
Cooperative security in distributed networks
Computer Communications
Hi-index | 0.02 |
A group membership protocol enables processes in a distributed system to agree on a group of processes that are currently operational. Membership protocols are a core component of many distributed systems and have proved to be fundamental for maintaining availability and consistency in distributed applications. In this paper we present a membership protocol for asynchronous distributed systems that tolerates the malicious corruption of group members. Our protocol ensures that correct members control and consistently observe changes to the group membership, provided that in each instance of the group membership, fewer than one-third of the members are corrupted or fail benignly. The protocol has many potential applications in secure systems and, in particular, is a central component of a toolkit for constructing secure and fault-tolerant distributed services that we have implemented.