Default Cover Image

Proceedings of 1993 IEEE 12th Symposium on Reliable Distributed Systems

Oct. 6 1993 to Oct. 8 1993

Princeton, NJ, USA

Table of Contents

Constructing secure distributed systems using componentsFull-text access may be available. Sign in or learn about subscription options.pp. 143,144,145,146,147,148,149,150,151,152
Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacksFull-text access may be available. Sign in or learn about subscription options.pp. 136,137,138,139,140,141
A secure two phase locking protocolFull-text access may be available. Sign in or learn about subscription options.pp. 126,127,128,129,130,131,132,133,134,135
Using atomic broadcast to implement a posteriori agreement for clock synchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 115,116,117,118,119,120,121,122,123,124
An approach to constructing modular fault-tolerant protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 105,106,107,108,109,110,111,112,113,114
An O(1) quorum consensus protocol tailored for the client/server architectureFull-text access may be available. Sign in or learn about subscription options.pp. 98,99,100,101,102,103,104
Efficient transparent optimistic rollback recovery for distributed application programsFull-text access may be available. Sign in or learn about subscription options.pp. 86,87,88,89,90,91,92,93,94,95
Lazy checkpoint coordination for bounding rollback propagationFull-text access may be available. Sign in or learn about subscription options.pp. 78,79,80,81,82,83,84,85
Rollback based on vector timeFull-text access may be available. Sign in or learn about subscription options.pp. 68,69,70,71,72,73,74,75,76,77
Using logging and asynchronous checkpointing to implement recoverable distributed shared memoryFull-text access may be available. Sign in or learn about subscription options.pp. 58,59,60,61,62,63,64,65,66,67
Bayesian analysis for fault location in homogeneous distributed systemsFull-text access may be available. Sign in or learn about subscription options.pp. 44,45,46,47,48,49,50,51,52,53
A compositional proof theory for fault tolerant real-time distributed systemsFull-text access may be available. Sign in or learn about subscription options.pp. 34,35,36,37,38,39,40,41,42,43
An approach for combinatorial performance and availability analysisFull-text access may be available. Sign in or learn about subscription options.pp. 24,25,26,27,28,29,30,31,32,33
APRICOTS a prototype implementation of a ConTract system: management of the control flow and the communication systemFull-text access may be available. Sign in or learn about subscription options.pp. 12,13,14,15,16,17,18,19,20,21
Processor group membership protocols: specification, design and implementationFull-text access may be available. Sign in or learn about subscription options.pp. 2,3,4,5,6,7,8,9,10,11
Showing 16 out of 16