Service and Protocol Architecture for the MAFTIA Middleware

作者: C Cachin , Miguel Correia , T McCutcheon , Nuno Ferreira Neves , B Pfitzmann

DOI:

关键词:

摘要: This document describes the specification of MAFTIA middleware architecture. focusses on models, building blocks and services. It tradeoffs made in terms choices their topology, portfolio services to be offered by applications highlevel In particular, regarding system model, it presents a detailed discussion fault, synchrony, topological, group which were used guide overall The architecture was divided into two main levels, site part connects network handles all inter-host operations, participant takes care distributed activities relies provided site-part components.

参考文章(83)
C. Labovitz, A. Ahuja, F. Jahanian, Experimental study of Internet stability and backbone failures ieee international symposium on fault tolerant computing. pp. 278- 285 ,(1999) , 10.1109/FTCS.1999.781062
Sam Toueg, Vassos Hadzilacos, Fault-tolerant broadcasts and related problems Distributed systems (2nd Ed.). pp. 97- 145 ,(1993)
P. Berman, J.A. Garay, Randomized distributed agreement revisited FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing. pp. 412- 419 ,(1993) , 10.1109/FTCS.1993.627344
Ronald Cramer, Ivan Damgård, Ueli Maurer, General secure multi-party computation from any linear secret-sharing scheme theory and application of cryptographic techniques. ,vol. 2000, pp. 316- 334 ,(2000) , 10.1007/3-540-45539-6_22
Luís Rodrigues, Paulo Veríssimo, Topology-Aware Algorithms for Large-Scale Communication Advances in Distributed Systems, Advanced Distributed Computing: From Algorithms to Systems. pp. 127- 156 ,(1999) , 10.1007/3-540-46475-1_6
M. Correia, P. Verissino, N.F. Neves, The architecture of a secure group communication system based on intrusion tolerance international conference on distributed computing systems. pp. 17- 22 ,(2001) , 10.1109/CDCS.2001.918681
Victor Shoup, Rosario Gennaro, Securing threshold cryptosystems against chosen ciphertext attack theory and application of cryptographic techniques. pp. 1- 16 ,(1998) , 10.1007/BFB0054113
Dominique Alessandri, Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems recent advances in intrusion detection. pp. 183- 196 ,(2000) , 10.1007/3-540-39945-3_12