{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T05:21:57Z","timestamp":1736054517668,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540295723"},{"type":"electronic","value":"9783540320920"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11572329_17","type":"book-chapter","created":{"date-parts":[[2005,10,12]],"date-time":"2005-10-12T13:09:38Z","timestamp":1129122578000},"page":"206-225","source":"Crossref","is-referenced-by-count":0,"title":["Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution"],"prefix":"10.1007","author":[{"given":"HariGovind V.","family":"Ramasamy","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Agbaria","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Trust in Cyberspace","year":"1999","key":"17_CR1","unstructured":"Schneider, F.B. (ed.): Trust in Cyberspace. National Academy Press, Washington DC (1999)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L. Lamport","year":"1978","unstructured":"Lamport, L.: Time, Clocks and Ordering of Events in Distributed Systems. Communications of the ACM\u00a021, 558\u2013565 (1978)","journal-title":"Communications of the ACM"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M. Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computer Systems (TOCS)\u00a020, 398\u2013461 (2002)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Rodrigues, R., Castro, M., Liskov, B.: BASE: Using Abstraction to Improve Fault Tolerance. In: Proceedings of the 18th Symposium on Operating System Principles, pp. 15\u201328 (2001)","DOI":"10.1145\/502059.502037"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Yin, J., Martin, J.P., Venkataramani, A., Alvisi, L., Dahlin, M.: Separating Agreement from Execution for Byzantine Fault Tolerant Services. In: Proc. 19th Symp. on Operating Systems Principles, pp. 253\u2013267 (2003)","DOI":"10.1145\/1165389.945470"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Kursawe, K.: Optimistic Byzantine Agreement. In: Proc. 21st Symposium on Reliable Distributed Systems, pp. 262\u2013267 (2002)","DOI":"10.1109\/RELDIS.2002.1180196"},{"key":"17_CR7","volume-title":"Handbook of Applied Cryptography","author":"S.A. Vanstone","year":"1996","unstructured":"Vanstone, S.A., van Oorschot, P.C., Menezes, A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-44647-8_31","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"C. Cachin","year":"2001","unstructured":"Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and Efficient Asynchronous Broadcast Protocols. In: Kilian, J. (ed.) CRYPTO 2001, vol.\u00a02139, pp. 524\u2013541. Springer, Heidelberg (2001)"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing\u00a017, 281\u2013308 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"17_CR10","unstructured":"Ramasamy, H.V., Agbaria, A., Sanders, W.H.: A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution. Submitted for publication in the IEEE Transactions on Dependable and Secure Computing (2005)"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s004460050050","volume":"11","author":"D. Malkhi","year":"1998","unstructured":"Malkhi, D., Reiter, M.: Byzantine Quorum Systems. Journal of Distributed Computing\u00a011, 203\u2013213 (1998)","journal-title":"Journal of Distributed Computing"},{"key":"17_CR12","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60042-6_7","volume-title":"Theory and Practice in Distributed Systems","author":"M.K. Reiter","year":"1995","unstructured":"Reiter, M.K.: The Rampart Toolkit for Building High-Integrity Services. In: Birman, K.P., Mattern, F., Schiper, A. (eds.) Dagstuhl Seminar 1994, vol.\u00a0938, pp. 99\u2013110. Springer, Heidelberg (1995)"},{"key":"17_CR13","unstructured":"Budhiraja, N., Schneider, F., Toueg, S., Marzullo, K.: The Primary-Backup Approach. In: Mullender, S. (ed.) Distributed Systems, pp. 199\u2013216. ACM Press - Addison Wesley (1993)"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/S0167-739X(01)00077-2","volume":"18","author":"L.F.G. Sarmenta","year":"2002","unstructured":"Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Generation Computer Systems\u00a018, 561\u2013572 (2002)","journal-title":"Future Generation Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11572329_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T22:24:13Z","timestamp":1736029453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11572329_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540295723","9783540320920"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11572329_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}