All Stories

  1. Chasing Lightspeed Consensus: Fast Wide-Area Byzantine Replication with Mercury
  2. Probabilistic Byzantine Fault Tolerance
  3. VEDLIoT
  4. An overview of software-defined storage
  5. Lazarus: Automatic Management of Diversity in BFT Systems
  6. SLICER: Safe Long-Term Cloud Event Archival
  7. PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT
  8. Cyberthreat Detection from Twitter using Deep Neural Networks
  9. Using Blockchains to Implement Distributed Measuring Systems
  10. BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks
  11. CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
  12. Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors
  13. A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform
  14. BCRB 2018 introduction
  15. Byzantine Fault-Tolerant Atomic Multicast
  16. On the Challenges of Building a BFT SCADA
  17. Using Diverse Detectors for Detecting Malicious Web Scraping Activity
  18. How blockchains can improve measuring instruments regulation and control
  19. SieveQ: A Layered BFT Protection System for Critical Services
  20. Dynamic adaptation of byzantine consensus protocols
  21. Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants
  22. Ginja
  23. A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic
  24. Elastic State Machine Replication
  25. A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform
  26. How blockchains can help legal metrology
  27. How Can Photo Sharing Inspire Sharing Genomes?
  28. Design and Implementation of a Consistent Data Store for a Distributed SDN Control Plane
  29. JITeR: Just-in-time application-layer routing
  30. BiobankCloud: A Platform for the Secure Storage, Sharing, and Processing of Large Biomedical Data Sets
  31. Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines
  32. On-Demand Indexing for Referential Compression of DNA Sequences
  33. Extensible distributed coordination
  34. A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data
  35. Distributed Applications and Interoperable Systems
  36. On the consistency of heterogeneous composite objects
  37. The TClouds Platform
  38. Towards Secure and Dependable Authentication and Authorization Infrastructures
  39. On the Design of Practical Fault-Tolerant SDN Controllers
  40. State Machine Replication for the Masses with BFT-SMART
  41. DepSky
  42. E-biobanking: What Have You Done to My Cell Samples?
  43. On the Feasibility of a Consistent and Fault-Tolerant Data Store for SDNs
  44. On the Performance of Byzantine Fault-Tolerant MapReduce
  45. An intrusion-tolerant firewall design for protecting SIEM systems
  46. Analysis of operating system diversity for intrusion tolerance
  47. Efficient Byzantine Fault-Tolerance
  48. FITCH: Supporting Adaptive Replicated Services in the Cloud
  49. The TClouds platform
  50. On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds
  51. The TClouds architecture: Open and resilient cloud-of-clouds computing
  52. Erratum to: On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions
  53. From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal Transformation
  54. On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions
  55. Brief Announcement: Decoupled and Consensus-Free Reconfiguration for Fault-Tolerant Storage
  56. Byzantine Fault-Tolerant MapReduce: Faults are Not Just Crashes
  57. From Byzantine fault tolerance to intrusion tolerance (a position paper)
  58. OS diversity for intrusion tolerance: Myth or reality?
  59. Recursive virtual machines for advanced security mechanisms
  60. On the Reliability and Availability of Systems Tolerant to Stealth Intrusion
  61. DepSky
  62. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks
  63. A Dependable Infrastructure for Cooperative Web Services Coordination
  64. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
  65. Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary
  66. An Efficient Byzantine-Resilient Tuple Space
  67. Intrusion-tolerant self-healing devices for critical infrastructure protection
  68. Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces
  69. Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned
  70. Proactive Byzantine Quorum Systems
  71. The Crutial Way of Critical Infrastructure Protection
  72. A Dependable Infrastructure for Cooperative Web Services Coordination
  73. On Byzantine generals with alternative plans
  74. DepSpace
  75. Byzantine Consensus with Unknown Participants
  76. DepSpace
  77. FOREVER
  78. The FOREVER service for fault/intrusion removal
  79. A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips
  80. Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
  81. A Semi-reliable Multicast Protocol for Distributed Multimedia Applications in Large Scale Networks
  82. Extending the UMIOP Specification for Reliable Multicast in CORBA
  83. Integrating the ROMIOP and ETF Specifications for Atomic Multicast in CORBA
  84. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces
  85. Implementing the multicast inter-ORB protocol