{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T11:16:46Z","timestamp":1678792606992},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Synthesis Lectures on Distributed Computing Theory"],"published-print":{"date-parts":[[2012,2,15]]},"DOI":"10.2200\/s00402ed1v01y201202dct009","type":"journal-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T23:25:29Z","timestamp":1329348329000},"page":"1-146","source":"Crossref","is-referenced-by-count":14,"title":["Quorum Systems: With Applications to Storage and Consensus"],"prefix":"10.1007","volume":"3","author":[{"given":"Marko","family":"Vukoli\u0107","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"p_3","doi-asserted-by":"crossref","unstructured":"Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, and Jay J. Wylie. Fault-scalable Byzantine fault-tolerant services. InProceedings of the 20th ACM symposium on Operating systems principles, pages59-74, October 2005. ISBN 1-59593-079-5. DOI: 10.1145\/1095809.1095817 Cited on page(s) 81, 88 10.1145\/1095809.1095817","DOI":"10.1145\/1095809.1095817"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0139-2"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0151-6"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.07.012"},{"key":"p_7","doi-asserted-by":"crossref","unstructured":"D. Agrawal and A. El Abbadi. Efficient solution to the distributed mutual exclusion problem. InProceedings of the 8th annual ACM Symposium on Principles of distributed computing, pages193-200, New York, NY, USA, 1989. ACM. ISBN 0-89791-326-4. DOI: 10.1145\/72981.72994 Cited on page(s) 210.1145\/72981.72994","DOI":"10.1145\/72981.72994"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1145\/1944345.1944348"},{"key":"p_9","doi-asserted-by":"crossref","unstructured":"Amitanand S. Aiyer, Lorenzo Alvisi, and Rida A. Bazzi. On the availability of non-strict quorum systems. InProceedings of the 19th International Conference on Distributed Computing, pages48-62, 2005. Cited on page(s) 116","DOI":"10.1007\/11561927_6"},{"key":"p_10","doi-asserted-by":"crossref","unstructured":"Amitanand S. Aiyer, Lorenzo Alvisi, and Rida A. Bazzi. Bounded wait-free implementation of optimally resilient Byzantine storage without (unproven) cryptographic assumptions. InProceedings of the 21st International Symposium on Distributed Computing, pages7-19, September 2007. DOI: 10.1145\/1281100.1281147 Cited on page(s) 79 10.1145\/1281100.1281147","DOI":"10.1145\/1281100.1281147"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90056-0"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1145\/210223.210224"},{"key":"p_14","first-page":"47","volume":"99","author":"Attiya Hagit","year":"2010","journal-title":"Bulletin of the European Association for Theoretical Computer Science EATCS, (100)"},{"key":"p_15","unstructured":"Hagit Attiya and Jennifer Welch. Distributed Computing. Fundamentals, Simulations, and Advanced Topics. McGraw-Hill, 1998. Cited on page(s)5"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1145\/200836.200869"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1145\/6420.6421"},{"key":"p_18","doi-asserted-by":"crossref","unstructured":"Rida Bazzi and Yin Ding. Non-skipping timestamps for Byzantine data storage systems. InProceedings of the 18th International Symposium on Distributed Computing, pages405-419, Oct 2004. DOI: 10.1007\/978-3-540-30186-8_29 Cited on page(s) 79 10.1007\/978-3-540-30186-8_29","DOI":"10.1007\/978-3-540-30186-8_29"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(98)00208-4"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050004"},{"key":"p_21","doi-asserted-by":"publisher","DOI":"10.1007\/PL00008925"},{"key":"p_22","unstructured":"Kenneth P. Birman and Robert V. Renesse. Reliable Distributed Computing with the ISIS Toolkit. IEEE Computer Society Press, Los Alamitos, CA, USA,1994. ISBN 0818653426. Cited on page(s)2"},{"key":"p_23","doi-asserted-by":"publisher","DOI":"10.1145\/637437.637447"},{"key":"p_24","doi-asserted-by":"crossref","unstructured":"Francisco Vilar Brasileiro, Fab\u00edola Greve, Achour Most\u00e9faoui, and Michel Raynal. Consensus in one communication step. InProceedings of the 6th International Parallel Computing Technologies Conference, pages42-50, 2001. Cited on page(s) 107","DOI":"10.1007\/3-540-44743-1_4"},{"key":"p_25","unstructured":"Eric A. Brewer. Towards robust distributed systems (abstract). InProceedings of The 19th Annual ACM Symposium on Principles of Distributed Computing, page7, 2000. ISBN 1-58113-183-6. Cited on page(s) 109"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3"},{"key":"p_27","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"p_30","doi-asserted-by":"publisher","DOI":"10.1109\/69.180609"},{"key":"p_31","unstructured":"James Cowling, Daniel Myers, Barbara Liskov, Rodrigo Rodrigues, and Liuba Shrira. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. InProceedings of the 7th Symposium on Operating Systems Design and Implementations, pages177-190, November 2006. Cited on page(s) 79"},{"key":"p_32","doi-asserted-by":"publisher","DOI":"10.1145\/5505.5508"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1137\/090757010"},{"key":"p_34","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"p_35","doi-asserted-by":"crossref","unstructured":"Burkhard Englert and Alexander A. Shvartsman. Graceful quorum reconfiguration in a robust emulation of shared memory. InProceedings of the 20th International Conference on Distributed Computing Systems, pages454-463, 2000. DOI: 10.1109\/ICDCS.2000.840958 Cited on page(s) 49 10.1109\/ICDCS.2000.840958","DOI":"10.1109\/ICDCS.2000.840958"},{"key":"p_36","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"p_37","doi-asserted-by":"publisher","DOI":"10.1145\/4221.4223"},{"key":"p_38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.05.004"},{"key":"p_39","doi-asserted-by":"crossref","unstructured":"David K. Gifford. Weighted voting for replicated data. InProceedings of the 7th ACM symposium on Operating systems principles, pages150-162, December 1979. ISBN 0-89791-009-5. DOI: 10.1145\/800215.806583 Cited on page(s) 2, 16 10.1145\/800215.806583","DOI":"10.1145\/800215.806583"},{"key":"p_40","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"p_41","doi-asserted-by":"crossref","unstructured":"Seth Gilbert, Nancy A. Lynch, and Alexander A. Shvartsman. Rambo ii: Rapidly reconfigurable atomic memory for dynamic networks. InProceedings of the 2003 International Conference on Dependable Systems and Networks, pages259-268, 2003. DOI: 10.1109\/DSN.2003.1209936 Cited on page(s) 49 10.1109\/DSN.2003.1209936","DOI":"10.1109\/DSN.2003.1209936"},{"key":"p_42","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-010-0117-1"},{"key":"p_43","doi-asserted-by":"crossref","unstructured":"Garth Goodson, Jay Wylie, Gregory Ganger, and Michael Reiter. Efficient Byzantine-tolerant erasure-coded storage. InProceedings of the International Conference on Dependable Systems and Networks, pages135-144, 2004. DOI: 10.1109\/DSN.2004.1311884 Cited on page(s) 81 10.1109\/DSN.2004.1311884","DOI":"10.1109\/DSN.2004.1311884"},{"key":"p_44","doi-asserted-by":"crossref","unstructured":"Vincent Gramoli and Michel Raynal. Timed quorum systems for large-scale and dynamic environments. InProceedings of the 11th International Conference on Principles of Distributed Systems, pages429-442, 2007. Cited on page(s) 116","DOI":"10.1007\/978-3-540-77096-1_31"},{"key":"p_45","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146419"},{"key":"p_46","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-010-0103-7"},{"key":"p_47","doi-asserted-by":"crossref","unstructured":"Rachid Guerraoui, Ron R. Levy, and Marko Vukoli\u0107. Lucky read\/write access to robust atomic storage. InProceedings of the International Conference on Dependable Systems and Networks, pages125-136, June 2006. ISBN 0-7695-2607-1. DOI: 10.1109\/DSN.2006.50 Cited on page(s) 81 10.1109\/DSN.2006.50","DOI":"10.1109\/DSN.2006.50"},{"key":"p_48","doi-asserted-by":"crossref","unstructured":"Rachid Guerraoui, Nikola Knezevi\u0107, Vivien Qu\u00e9ma, and Marko Vukoli\u0107. The next 700 BFT protocols. InProceedings of the 5th ACM SIGOPS\/EuroSys European Conference on Computer Systems, pages363-376, 2010. DOI: 10.1145\/1755913.1755950 Cited on page(s) 81 10.1145\/1755913.1755950","DOI":"10.1145\/1755913.1755950"},{"key":"p_49","doi-asserted-by":"publisher","DOI":"10.1145\/6306.6308"},{"key":"p_50","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"p_51","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910003"},{"key":"p_52","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480193260303"},{"key":"p_53","doi-asserted-by":"publisher","DOI":"10.1145\/278298.278305"},{"key":"p_54","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294267"},{"key":"p_55","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"p_56","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90045-4"},{"key":"p_57","doi-asserted-by":"publisher","DOI":"10.1007\/BF01786227"},{"key":"p_58","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"p_59","first-page":"31","volume-title":"ACM SIGACT news distributed computing column, 32(4):51-58","author":"Lamport Leslie","year":"2001"},{"key":"p_60","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-37795-6_5"},{"key":"p_61","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0005-x"},{"key":"p_62","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"p_63","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"p_64","first-page":"5","author":"Lynch Nancy A.","year":"1996","journal-title":"Distributed Algorithms. Morgan-Kaufmann"},{"key":"p_65","doi-asserted-by":"crossref","unstructured":"Nancy A. Lynch and Alexander A. Shvartsman. Robust emulation of shared memory using dynamic quorum-acknowledged broadcasts. InProceedings of the 27th Annual International Symposium on Fault-Tolerant Computing, pages272-281, 1997. DOI: 10.1109\/FTCS.1997.614100 Cited on page(s) 49 10.1109\/FTCS.1997.614100","DOI":"10.1109\/FTCS.1997.614100"},{"key":"p_66","doi-asserted-by":"crossref","unstructured":"Nancy A. Lynch and Alexander A. Shvartsman. Rambo: A reconfigurable atomic memory service for dynamic networks. InProceedings of the 16th International Conference on Distributed Computing, pages173-190, 2002. Cited on page(s) 49","DOI":"10.1007\/3-540-36108-1_12"},{"issue":"3","key":"p_67","first-page":"219","volume":"2","author":"Lynch Nancy A.","year":"1989","journal-title":"CWI Quarterly"},{"key":"p_68","doi-asserted-by":"publisher","DOI":"10.1145\/214438.214445"},{"key":"p_69","unstructured":"Dahlia Malkhi. Quorum Systems. The Encyclopedia of Distributed Computing, J. Urban and P. Dasgupta, eds.Kluwer Academic, 2000. Cited on page(s)17, 23"},{"key":"p_70","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050050"},{"key":"p_71","unstructured":"Dahlia Malkhi and Michael K. Reiter. Secure and scalable replication in phalanx. InProceedings of the 17th Symposium on Reliable Distributed Systems, pages51-58, 1998b. URL citeseer.ist. psu.edu\/article\/malkhi98secure.html. Cited on page(s) 52, 79"},{"key":"p_72","doi-asserted-by":"crossref","unstructured":"Dahlia Malkhi, Michael Reiter, Avishai Wool, and Rebecca N. Wright. Probabilistic byzantine quorum systems. InProceedings of the seventeenth annual ACM symposium on Principles of distributed computing, PODC '98, pages321- New York, NY, USA, 1998. ACM. ISBN 0-89791-977-7.","DOI":"10.1145\/277697.277781"},{"key":"p_75","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539797325235"},{"key":"p_76","doi-asserted-by":"publisher","DOI":"10.1006\/inco.2001.3054"},{"key":"p_77","doi-asserted-by":"crossref","unstructured":"J-P. Martin, L. Alvisi, and M. Dahlin. Small Byzantine quorum systems. InProceedings of the International Conference on Dependable Systems and Networks, pages374-383, June 2002a. URL http:\/\/www.cs.utexas.edu\/users\/jpmartin\/papers\/smallByz_DSN.ps. DOI: 10.1109\/DSN.2002.1028922 Cited on page(s) 79 10.1109\/DSN.2002.1028922","DOI":"10.1109\/DSN.2002.1028922"},{"key":"p_78","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.35"},{"key":"p_79","doi-asserted-by":"crossref","unstructured":"Jean-Philippe Martin, Lorenzo Alvisi, and Michael Dahlin. Minimal Byzantine storage. InProceedings of the 16th International Conference on Distributed Computing, pages311-325, October 2002b. ISBN 3-540-00073-9. DOI: 10.1007\/3-540-36108-1_21 Cited on page(s) 79 10.1007\/3-540-36108-1_21","DOI":"10.1007\/3-540-36108-1_21"},{"key":"p_80","doi-asserted-by":"crossref","unstructured":"Michael G. Merideth and Michael K. Reiter. Probabilistic opaque quorum systems. InProceedings of the 21st International Conference on Distributed Computing, pages403-419, 2007. Cited on page(s) 115","DOI":"10.1007\/978-3-540-75142-7_31"},{"key":"p_81","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-004-0114-3"},{"key":"p_82","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795281232"},{"key":"p_83","doi-asserted-by":"crossref","unstructured":"Brian M. Oki and Barbara H. Liskov. Viewstamped replication: A new primary copy method to support highly-available distributed systems. InProceedings of the seventh annual ACM Symposium on Principles of distributed computing, PODC '88, pages8-17, New York, NY, USA, 1988. ACM. ISBN 0-89791-277-2. URL http:\/\/doi.acm.org\/10.1145\/62546.62549. DOI: 10.1145\/62546.62549 Cited on page(s) 4710.1145\/62546.62549","DOI":"10.1145\/62546.62549"},{"key":"p_84","first-page":"20","volume-title":"Combinatorial optimization: algorithms and complexity","author":"Christos","year":"1982"},{"key":"p_85","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1169"},{"key":"p_86","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050027"},{"key":"p_87","doi-asserted-by":"crossref","unstructured":"Gary L. Peterson and Michael J. Fischer. Economical solutions for the critical section problem in a distributed system (extended abstract). InProceedings of the 9th Annual ACM Symposium on Theory of Computing, pages91-97, 1977. DOI: 10.1145\/800105.803398 Cited on page(s) 9 10.1145\/800105.803398","DOI":"10.1145\/800105.803398"},{"key":"p_88","doi-asserted-by":"crossref","unstructured":"HariGovind V. Ramasamy and Christian Cachin. Parsimonious asynchronous Byzantine-faulttolerant atomic broadcast. InProceedings of the 9th International Conference on Principles of Distributed Systems, pages88-102, December 2005. DOI: 10.1007\/11795490_9 Cited on page(s) 81 10.1007\/11795490_9","DOI":"10.1007\/11795490_9"},{"key":"p_89","doi-asserted-by":"publisher","DOI":"10.2200\/S00236ED1V01Y201004DCT002"},{"key":"p_90","unstructured":"Rodrigo Rodrigues, Petr Kouznetsov, and Bobby Bhattacharjee. Large-scale Byzantine fault tolerance: safe but not always live. InProceedings of the 3rd workshop on on Hot Topics in System Dependability, page17, Berkeley, CA, USA, 2007. USENIX Association. Cited on page(s) 53"},{"key":"p_91","doi-asserted-by":"publisher","DOI":"10.1145\/320071.320076"},{"key":"p_92","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"p_93","first-page":"3","volume":"125","author":"Vukoli\u0107 Marko","year":"2010","journal-title":"Bulletin of the European Association for Theoretical Computer Science EATCS, (101)"},{"key":"p_94","first-page":"3","volume":"21","author":"Wool Avishai","year":"1998","journal-title":"Bulletin of the IEEE Technical Committee on Data Engineering"},{"key":"p_95","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0133-8"},{"key":"p_96","doi-asserted-by":"crossref","unstructured":"Piotr Zielinski. Optimistically terminating consensus: All asynchronous consensus protocols in one framework. InProceedings of The 5th International Symposium on Parallel and Distributed Computing, pages24-33, 2006. ISBN 0-7695-2638-1. DOI: 10.1109\/ISPDC.2006.37 Cited on page(s) 81, 97, 107 10.1109\/ISPDC.2006.37","DOI":"10.1109\/ISPDC.2006.37"}],"container-title":["Synthesis Lectures on Distributed Computing Theory"],"original-title":[],"language":"en","deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T16:02:52Z","timestamp":1658505772000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.morganclaypool.com\/doi\/abs\/10.2200\/S00402ED1V01Y201202DCT009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,15]]},"references-count":90,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2,15]]}},"alternative-id":["10.2200\/S00402ED1V01Y201202DCT009"],"URL":"https:\/\/doi.org\/10.2200\/s00402ed1v01y201202dct009","relation":{},"ISSN":["2155-1626","2155-1634"],"issn-type":[{"value":"2155-1626","type":"print"},{"value":"2155-1634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,15]]}}}