[1]王政,赵明,斯雪明,等.基于局部签名Hash表的证书撤销列表方案[J].计算机工程,2009,35(1):36-40.[2]吴庆涛,华彬,郑瑞娟,等.基于自律计算的入侵容忍模型[J].计算机应用,2010,30(9):2386-2388.[3]LIU J M, LI Y Z, ZHAO Y, et al. Research on computer immune system based on intrusion tolerance [C] // Proceedings of the 2010 International Conference on Future Information Technology and Management Engineering. Piscataway: IEEE Press, 2010: 200-203.[4]LIU L X, XIA J B, MA Z Q, et al. Rapid-response replication: a fault tolerant algorithm based on active replication [C] // Proceedings of the 7th International Conference on Computational Science. Berlin: Springer-Verlag, 2007: 133-136.[5]WANG Y J, LI S J. Research and performance evaluation of data replication technology in distributed storage systems [J]. Computer and Mathematics with Applications, 2006, 51(11): 1625-1632.[6]DI R H, WANG T, LIANG Y, et al. The analysis and implementation of partition replication-based distributed cache system [C]// Proceedings of the 12th International Conference on High Performance Computing and Communications. Piscataway: IEEE Press, 2010: 719-724.[7]de JUAN-MARIN R, DECKER H, MUNOZ-ESCO F D. Revisiting hot passive replication [C]// Proceedings of the Second International Conference on Availability, Reliability and Security. Washington, DC: IEEE Computer Society, 2007: 93-102.[8]刘海蛟,荆继武,林璟锵,等.一种入侵容忍的资料库[J].中国科学院研究生院学报,2006,23(1):46-51.[9]SAMYDURAI A, MUKHERJEE S. Fully distributed active software objects replication in OO-Middleware [C]// Proceedings of the 16th IEEE International Conference on Networks. Piscataway: IEEE Press, 2008: 1-6.[10]TARIQ Q I. Learning from experience: better design techniques for an improved consensus protocol [C]// Proceedings of the 2nd IEEE International Conference on Computer Technology and Development. Piscataway: IEEE Press, 2010: 420-424.[11]AMIR Y, COAN B, KIRSCH J, et al. Prime: Byzantine replication under attack [J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(4): 564-577.[12]ZHAO J, TANG S P. An improved over-issued CRLs method [C]// Proceedings of the Second International Conference on Innovative Computing, Information and Control. Piscataway: IEEE Press, 2007: 481-484. |