[1] MALEK B, MIRI A. Combining attribute-based and access systems[C]//CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering. Washington, DC: IEEE Computer Society, 2009, 3: 305-312. [2] Google Inc. Google maps API concepts[EB/OL]. (2007-10-12) [2015-06-17]. http://code.google.com/intl/zh-CN/apis/maps/index.html. [3] Microsoft Inc. Bing maps now easier than ever[EB/OL]. (2011-03-01) [2015-05-21]. http://www.microsoft.com/maps/. [4] CURBERA F, DUFTLER M, KHALAF R, et al. Unraveling the Web services Web: an introduction to SOAP, WSDL, and UDDI[J]. IEEE Internet Computing, 2002, 6(2): 86-93. [5] LAMPORT L, SHOSTAK R, PEASE M. The Byzantine generals problem[J]. ACM Transactions on Programming Languages and Systems, 1982, 4(3): 382-401. [6] SINGH A, FONSECA P, KUZNETSOV P, et al. Zeno: eventually consistent Byzantine-fault tolerance[C]//NSDI '09: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation. Berkeley, CA: USENIX Association, 2009: 169-184. [7] DOUCEUR J R, HOWELL J. Byzantine fault isolation in the Farsite distributed file system [C/OL]//IPTPS '06: Proceedings of the 5th International Workshop on Peer-To-Peer Systems. London: dblp Computer Science Bibliography, 2006: 196-201. [8] COWLING J, MYERS D, LISKOV B, et al. HQ replication: a hybrid quorum protocol for Byzantine fault tolerance[C]//OSDI '06: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. Berkeley, CA: USENIX Association, 2006: 177-190. [9] CASTRO M, LISKOV B. Practical byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002, 20(4): 398-461. [10] ABD-EL-MALEK M, GANGER G R, GOODSON G R, et al. Fault-scalable Byzantine fault-tolerant services[J]. ACM SIGOPS Operating Systems Review — SOSP '05, 2005, 39(5): 59-74. [11] DRISCOLL K, HALL B, SIVENCRONA H, et al. Byzantine fault tolerance, from theory to reality[C]//SAFECOMP 2003: Proceedings of the 22nd International Conference on Computer Safety, Reliability, and Security, LNCS 2788. Berlin: Springer-Verlag, 2003: 235-248. [12] KOTLA R, CLEMENT A, WONG E, et al. Zyzzyva: speculative Byzantine fault tolerance[J]. Communications of the ACM, 2008, 51(11): 86-95. [13] YIN J, MARTIN J-P, VENKATARAMANI A, et al. Towards a practical approach to confidential Byzantine fault tolerance[M]//Future Directions in Distributed Computing, LNCS 2584. Berlin: Springer-Verlag, 2003: 51-56. [14] MERIDETH M G, IYENGAR A, MIKALSEN T, et al. Thema: Byzantine-fault-tolerant middleware for Web-service applications[C]//SRDS '05: Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems. Washington, DC: IEEE Computer Society, 2005: 131-142. [15] AHMED S. A scalable Byzantine fault tolerant secure domain name system [D]. Massachusetts: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science, 2001: 33-37. [16] PALLEMULLE S L, THORVALDSSON H D, GOLDMAN K J. Byzantine fault-tolerant Web services for n-tier and service oriented architectures[C]//ICDCS '08: Proceedings of the 28th International Conference on Distributed Computing Systems. Washington, DC: IEEE Computer Society, 2008: 260-268. [17] FRY C P, REITER M K. Nested objects in a Byzantine quorum-replicated system[C]//SRDS '04: Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems. Washington, DC: IEEE Computer Society, 2004: 79-89. [18] NARASIMHAN P, KIHLSTROM K P, MOSER L E, et al. Providing support for survivable CORBA applications with the Immune system[C]//ICDCS '99: Proceedings of the 19th IEEE International Conference on Distributed Computing Systems. Washington, DC: IEEE Computer Society, 1999: 507-516. [19] 张焕国,罗捷,金刚,等.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. (ZHANG H G, LUO J, JIN G, et al. The research development of trust computing[J]. Journal of Wuhan University (Nature Science Edtion), 2006, 52(5): 513-518.) [20] 刘玲霞,武兆雪,钱渊,等.Web服务容错技术研究[J]. 计算机科学,2009,36(1):24-28. (LIU L X, WU Z X, QIAN Y, et al. Fault-tolerant Web services[J]. Computer Science, 2009, 36(1): 24-29.) [21] 刘玲霞,王东霞,黄敏桓.一个Web服务可信体系结构[J].计算机科学,2014,41(12):30-32. (LIU L X, WANG D X, HUNAG M H. Trustworthy architecture for Web services[J]. Computer Science, 2014, 41(12): 30-32.) [22] 范捷,易乐天,舒继武.拜占庭系统技术研究综述[J].软件学报,2013,24(6):1346-1360. (FAN J, YI L T, SHU J W. Research on the technologies of Byzantine system[J]. Journal of Software, 2013, 24(6): 1346-1360.) |