Schliessen
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
Schliessen
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Werk suchen
Insider-resistant distributed storage systems / Martina Eikel ; [Reviewers: Prof. Dr. Christian Scheideler, University of Paderborn, Prof. Dr. Friedhelm Meyer auf der Heide, University of Paderborn]. Paderborn, 2016
Inhalt
1 Introduction
1.1 Thesis Overview
1.2 Related work
1.2.1 Distributed Hash Tables
1.2.2 Erasure Codes & Byzantine Fault-Tolerant Storage Systems
1.2.3 Authenticated Data Structures
2 Model and Preliminaries
2.1 Model
2.2 Preliminaries
3 Basic IRIS
3.1 Butterfly Coding Strategy
3.2 Storage Strategy
3.2.1 Internal Distributed Error Correcting Code
3.2.2 Redundancy Analysis
3.3 Lookup Protocol
3.3.1 Preprocessing Stage
3.3.2 Probing Stage
3.3.3 Decoding Stage
3.3.4 Differences and Similarities to Previous Works
3.4 Correctness Analysis of the Lookup Protocol
3.4.1 Robust Hash Functions
3.4.2 Analysis of the Probing Stage
3.4.3 Analysis of the Decoding Stage
4 Enhanced IRIS
4.1 Preliminaries
4.2 Storage Strategy
4.3 Lookup Protocol
4.3.1 Preprocessing Stage
4.3.2 Probing Stage
4.3.3 Decoding Stage
5 RoBuSt
5.1 Preliminaries
5.2 Storage Strategy
5.3 Write Protocol
5.3.1 Preprocessing Stage
5.3.2 Outline of the Writing Stage
5.3.3 Details on the Decoding of a Bucket (Step 1)
5.3.4 Details on the Encoding of a Bucket (Step 2, Step 3b)
5.3.5 Details on Counting and Selecting (Step 3, Step 3a)
5.4 Lookup Protocol
5.4.1 Preprocessing Stage
5.4.2 Zone Examination Stage
5.5 Correctness Analysis of the Lookup Protocol
5.5.1 Analysis of the Probing Stage
5.5.2 Analysis of the Decoding Stage
6 OSIRIS
6.1 Preliminaries
6.2 Storage Strategy
6.2.1 Internal Distributed Error Detecting and Correcting Code
6.2.2 Storage Strategy of a Single Bucket
6.3 Lookup Protocol
6.3.1 Outline of the Lookup Protocol
6.3.2 Probing Stage
6.3.3 Recovery Stage
6.4 Write Protocol
6.5 Correctness Analysis of the Lookup Protocol
6.5.1 Analysis of the Probing Stage
6.5.2 Analysis of the Recovery Stage
7 Conclusion and Outlook
7.1 Conclusion
7.2 Outlook
Die detaillierte Suchanfrage erfordert aktiviertes Javascript.