@inproceedings{3ac3f57be68c4394b922e46008f41dc2,
title = "Intrusion masking for distributed atomic operations",
abstract = "Distributed database transactions are treated as atomic operations. This paper considers intrusion masking atomic operations among replica groups. The paper proposes two Byzantine fault tolerant two-phase commit protocols (BFT-2PC) to tolerate both malicious coordinator and malicious participants. When the total number of malicious replicas is no more than a specific threshold the protocols can mask attacks. Even if the number of faulty replicas is more than the threshold our protocols are still survivable in some cases. We analyzed the expected survivability and efficiency of our protocols. The analytic results demollstrate that our protocols are practical.",
author = "Meng Yu and Peng Liu and Wanyu Zang",
year = "2003",
doi = "10.1007/978-0-387-35691-4",
language = "English (US)",
isbn = "9781475764895",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "229--240",
booktitle = "Security and Privacy in the age of Uncertainty - IFIP TC11 18th International Conference on Information Security, SEC 2003",
note = "IFIP TC11 18th International Conference on Information Security, SEC 2003 ; Conference date: 26-05-2003 Through 28-05-2003",
}