Back to Results
First PageMeta Content
State machine replication / Replication / Public-key cryptography / Communications protocol / Byzantine fault tolerance / Fault-tolerant system / Transmission Control Protocol / Computing / Fault-tolerant computer systems / Data synchronization


Proactive Recovery in a Byzantine-Fault-Tolerant System Miguel Castro and Barbara Liskov Laboratory for Computer Science, Massachusetts Institute of Technology, 545 Technology Square, Cambridge, MA[removed]castro,liskov @l
Add to Reading List

Document Date: 2000-09-13 19:13:12


Open Document

File Size: 976,39 KB

Share Result on Facebook

Company

CHECKPOINT / IBM / Air Force Research Laboratory / Dallas Semiconductors / Barbara Liskov Laboratory / /

/

Event

Product Issues / FDA Phase / /

Facility

Technology Square / Air Force Research Laboratory / Massachusetts Institute of Technology / /

IndustryTerm

security chip / request processing protocol / recovery protocol / software errors / cryptographic co-processor / proactive security algorithms / secure co-processors / earlier algorithm / real services / software diversity / important services / tolerant state-machine replication systems / nondeterministic software bugs / online information services / secure cryptographic co-processor / estimation protocol / view change protocol / secure co-processor / software bugs / message processing / state-machine replication algorithms / normal-case request processing / request processing / e.g. file systems / co-processor / /

Organization

Massachusetts Institute of Technology / /

Position

administrator / /

Product

MACs / replica pre-prepares / node / primary / message / replica / UMAC32 / delay communication / Each replica stores / view-change messages / nodes / replicas / clients / non-faulty replicas / backups / /

Technology

earlier algorithm / recovery protocol / key exchange protocol / request processing protocol / cryptographic co-processor / secure co-processors / optimized protocol / private key / secret key / previous proactive security algorithms / 3 Algorithm Properties Our algorithm / operating system / security chip / operating systems / 4.4 Recovery The recovery protocol / 4 Algorithm The algorithm / view change protocol / cryptography / public key / secure co-processor / three-phase protocol / previous state-machine replication algorithms / secure cryptographic co-processor / estimation protocol / 4.5 View Change Protocol The view change protocol / checkpoint protocol / same protocol / flash / 545 Technology / /

SocialTag