参考文献
[1]Armbrust M,Fox A,Griffith R,et al.A View of Cloud Computing[J].Communications of the ACM,2010,53(4):50-58.
[2]Tang Longji,Dong Jing,Zhao Yajing,et al.Enterprise Cloud Service Architecture[C]//Proceedings of the 3rd IEEE International Conference on Cloud Computing.Washington D.C.,USA:IEEE Press,2010:27-34.
[3]Chandra A,Weissman J.Nebulas:Using Distributed Voluntary Resources to Build Clouds[C]//Proceedings of Conference on Hot Topics in Cloud Computing.[S.l.]:USENIX Association,2009.
[4]Anderson D P,Fedak G.The Computational and Storage Potential of Volunteer Computing[C]//Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid.Washington D.C.,USA:IEEE Press,2006:73-80.
[5]Andrzejak A,Kondo D,Anderson D P.Exploiting Non-dedicated Resources for Cloud Computing[C]//Pro-ceedings of 2010 IEEE Network Operations and Management Symposium.Washington D.C.,USA:IEEE Press,2010:341-348.
[6]Gupta A,Awasthi L K.Peer Enterprises:A Viable Alternative to Cloud Computing[C]//Proceedings of 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications.Washington D.C.,USA:IEEE Press,2009:1-6.
[7]Lamport L,Shostak R,Pease M.The Byzantine Generals Problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[8]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[9]Pease M,Shostak R,Lamport L.Reaching Agreement in the Presence of Faults[J].Journal of the Association for Computing Machinery,1980,27(2):228-234.
[10]Berman P,Garay J A,Perry K J.Towards Optimal Distributed Consensus[C]//Proceedings of the 30th Annual Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,1989:410-415.
[11]Castro M,Liskov B.Practical Byzantine Fault-tolerance and Proactive Recovery[J].ACM Transactions on Computer Systems,2002,20(4):398-461.
[12]Kotla R,Alvisi L,Dahlin M,et al.Zyzzyva:Speculative Byzantine Fault Tolerance[C]//Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles.New York,USA:ACM Press,2007:45-58.
[13]Zhang Yilei,Zheng Zibin,Lyu M R.BFTCloud:A Byzantine Fault Tolerance Framework for Voluntary-resource Cloud Computing[C]//Proceedings of IEEE International Conference on Cloud Computing.Washington D.C.,USA:IEEE Press,2011:444-451.
[14]Amir Y,Coan B,Kirsch J.Prime:Byzantine Replication Under Attack[J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):564-577.
[15]邹立新,丁建立.基于拜占庭协议的入侵容忍系统模型设计[J].计算机工程,2006,32(7):88-90.
[16]王吉喆,赵蕴龙,吴静.WMN 中拜占庭容错网络结构及算法[J].计算机工程,2011,37(20):83-86.
[17]Ganesh A J,Kermarrec A M,Massoulie L.Peer-to-peer Membership Management for Gossip-based Protocols[J].IEEE Transactions on Computers,2003,52(2):139-149.
[18]Allavena A,Demers A,Hopcroft J E.Correctness of a Gossip Based Membership Protocol[C]//Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing.New York,USA:ACM Press,2005:292-301.
[19]Gurevich M,Keidar I.Correctness of Gossip-based Membership Under Message Loss[J].SIAM Journal on Computing,2009,39(8):3830-3859.
编辑金胡考 |