Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SRDS
SRDS 2018
Generate Citations
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
Oct. 2 2018 to Oct. 5 2018
Salvador, Brazil
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-9
Message from the General Chair
Freely available from IEEE.
pp. 10-10
Message from the Technical Program Co-Chairs
Freely available from IEEE.
pp. 11-11
Symposium Organization
Freely available from IEEE.
pp. 12-13
Technical Program Committee
Freely available from IEEE.
pp. 14-14
Reviewers
Freely available from IEEE.
pp. 15-15
Acknowledgements
Freely available from IEEE.
pp. 16-16
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Run Guo
,
Jianjun Chen
,
Baojun Liu
,
Jia Zhang
,
Chao Zhang
,
Haixin Duan
,
Tao Wan
,
Jian Jiang
,
Shuang Hao
,
Yaoqi Jia
Impact of Man-In-The-Middle Attacks on Ethereum
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Parinya Ekparinya
,
Vincent Gramoli
,
Guillaume Jourjon
US-AID: Unattended Scalable Attestation of IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Ahmad Ibrahim
,
Ahmad-Reza Sadeghi
,
Gene Tsudik
A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
David Lanoe
,
Michel Hurfin
,
Eric Totel
Practical Continuous Aggregation in Wireless Edge Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Pedro Ákos Costa
,
João Leitão
Breaking the Scalability Barrier of Causal Broadcast for Large and Dynamic Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Brice Nédelec
,
Pascal Molli
,
Achour Mostéfaoui
Policy-Based Adaptation of a Byzantine Fault Tolerant Distributed Graph Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-71
by
Manuel Bravo
,
Luís Rodrigues
,
Ray Neiheiser
,
Luciana Rech
Mobile Cloud-of-Clouds Storage Made Efficient: A Network Coding Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-82
by
Jiajie Shen
,
Yi Li
,
Yangfan Zhou
,
Xin Wang
Adversarially-Resistant On-Demand Topic Channels for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-92
by
Hans Walter Behrens
,
K. Selçuk Candan
Secure Information Forwarding through Fragmentation in Delay-Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-102
by
Shudip Datta
,
Sanjay Madria
,
James Milligan
,
Mark Linderman
RATCHETA: Memory-Bounded Hybrid Byzantine Consensus for Cooperative Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-112
by
Wenbo Xu
,
Rüdiger Kapitza
MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Christoph Lambert
,
Maria Fernandes
,
Jérémie Decouchant
,
Paulo Esteves-Verissimo
PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-132
by
Sergei Arnautov
,
Andrey Brito
,
Pascal Felber
,
Christof Fetzer
,
Franz Gregor
,
Robert Krahn
,
Wojciech Ozga
,
André Martin
,
Valerio Schiavoni
,
Fábio Silva
,
Marcus Tenorio
,
Nikolaus Thümmel
Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-142
by
Christian Göttel
,
Rafael Pires
,
Isabelly Rocha
,
Sébastien Vaucher
,
Pascal Felber
,
Marcelo Pasin
,
Valerio Schiavoni
Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-152
by
Simon Bouget
,
Yérom-David Bromberg
,
Hugues Mercier
,
Etienne Rivière
,
François Taiani
DMap: A Fault-Tolerant and Scalable Distributed Data Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-160
by
Samuel Benz
,
Fernando Pedone
Enabling State Estimation for Fault Identification in Water Distribution Systems Under Large Disasters
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Qing Han
,
Ronald Eguchi
,
Sharad Mehrotra
,
Nalini Venkatasubramanian
Improving Reliability of Deduplication-Based Storage Systems with Per-File Parity
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-180
by
Suzhen Wu
,
Huagao Luan
,
Bo Mao
,
Hong Jiang
,
Gen Niu
,
Hui Rao
,
Fang Yu
,
Jindong Zhou
MuSE: Multimodal Searchable Encryption for Cloud Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-190
by
Bernardo Ferreira
,
João Leitão
,
Henrique Domingos
Héron: Taming Tail Latencies in Key-Value Stores Under Heterogeneous Workloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-200
by
Vikas Jaiman
,
Sonia Ben Mokhtar
,
Vivien Quéma
,
Lydia Y. Chen
,
Etienne Rivière
A Requirements-Driven Methodology for the Proper Selection and Configuration of Blockchains
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-206
by
Mirko Staderini
,
Enrico Schiavone
,
Andrea Bondavalli
Crash-Resilient Decentralized Synchronous Runtime Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
Shokoufeh Kazemlou
,
Borzoo Bonakdarpour
Decentralized Release of Self-Emerging Data using Smart Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-220
by
Chao Li
,
Balaji Palanisamy
Geographic State Machine Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-230
by
Paulo Coelho
,
Fernando Pedone
Kernel Paxos
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-240
by
Emanuele Giuseppe Esposito
,
Paulo Coelho
,
Fernando Pedone
MDC-Cast: A Total-Order Broadcast Protocol for Multi-Datacenter Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-250
by
Mohamad-Jaafar Nehme
,
Nicolas Palix
,
Kamal Beydoun
,
Vivien Quema
Byzantine Agreement with Interval Validity
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-260
by
Darya Melnyk
,
Roger Wattenhofer
Dynamic Checkpoint Architecture for Reliability Improvement on Distributed Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-263
by
Paulo Vinicius Cardoso
,
Patrícia Pitthan Barcelos
Security, Performance and Energy Implications of Hardware-Assisted Memory Protection Mechanisms on Event-Based Streaming Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-266
by
Christian Göttel
,
Rafael Pires
,
Isabelly Rocha
,
Sébastien Vaucher
,
Pascal Felber
,
Marcelo Pasin
,
Valerio Schiavoni
Collective Attestation: for a Stronger Security in Embedded Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-268
by
Ahmad Ibrahim
Towards Real-Time-Aware Intrusion Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-270
by
Christoph Lambert
,
Marcus Völp
,
Jérémie Decouchant
,
Paulo Esteves-Verissimo
Definition of an Architecture for Dynamic and Automatic Checkpoints on Apache Spark
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-272
by
Paulo Vinicius Cardoso
,
Patrícia Pitthan Barcelos
Model-Driven Middleware to Support the Creation of Applications within Different Domains in Smart Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-274
by
Paulo César Ferreira Melo
,
Fábio Moreira Costa
Author Index
Freely available from IEEE.
pp. 275-276
[Publisher's information]
Freely available from IEEE.
pp. 278-278
Showing 45 out of 45