Default Cover Image

2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)

Oct. 2 2018 to Oct. 5 2018

Salvador, Brazil

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-9
Message from the General ChairFreely available from IEEE.pp. 10-10
Message from the Technical Program Co-ChairsFreely available from IEEE.pp. 11-11
Symposium OrganizationFreely available from IEEE.pp. 12-13
Technical Program CommitteeFreely available from IEEE.pp. 14-14
ReviewersFreely available from IEEE.pp. 15-15
AcknowledgementsFreely available from IEEE.pp. 16-16
Impact of Man-In-The-Middle Attacks on EthereumFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
US-AID: Unattended Scalable Attestation of IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Practical Continuous Aggregation in Wireless Edge EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Breaking the Scalability Barrier of Causal Broadcast for Large and Dynamic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Policy-Based Adaptation of a Byzantine Fault Tolerant Distributed Graph DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 61-71
Mobile Cloud-of-Clouds Storage Made Efficient: A Network Coding Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 72-82
Adversarially-Resistant On-Demand Topic Channels for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 83-92
Secure Information Forwarding through Fragmentation in Delay-Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
RATCHETA: Memory-Bounded Hybrid Byzantine Consensus for Cooperative Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 103-112
MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGXFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
DMap: A Fault-Tolerant and Scalable Distributed Data StructureFull-text access may be available. Sign in or learn about subscription options.pp. 153-160
Improving Reliability of Deduplication-Based Storage Systems with Per-File ParityFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
MuSE: Multimodal Searchable Encryption for Cloud ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Héron: Taming Tail Latencies in Key-Value Stores Under Heterogeneous WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
A Requirements-Driven Methodology for the Proper Selection and Configuration of BlockchainsFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
Crash-Resilient Decentralized Synchronous Runtime VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Decentralized Release of Self-Emerging Data using Smart ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 213-220
Geographic State Machine ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 221-230
Kernel PaxosFull-text access may be available. Sign in or learn about subscription options.pp. 231-240
MDC-Cast: A Total-Order Broadcast Protocol for Multi-Datacenter EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 241-250
Byzantine Agreement with Interval ValidityFull-text access may be available. Sign in or learn about subscription options.pp. 251-260
Dynamic Checkpoint Architecture for Reliability Improvement on Distributed FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 261-263
Collective Attestation: for a Stronger Security in Embedded NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 267-268
Towards Real-Time-Aware Intrusion ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 269-270
Definition of an Architecture for Dynamic and Automatic Checkpoints on Apache SparkFull-text access may be available. Sign in or learn about subscription options.pp. 271-272
Author IndexFreely available from IEEE.pp. 275-276
[Publisher's information]Freely available from IEEE.pp. 278-278
Showing 45 out of 45