Bounded Concurrent Time-Stamping

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bounded Concurrent Time-Stamping

We introduce concurrent time-stamping, a paradigm that allows processes to temporally order concurrent events in an asynchronous shared-memory system. Concurrent time-stamp systems are powerful tools for concurrency control, serving as the basis for solutions to coordination problems such as mutual exclusion, `-exclusion, randomized consensus, and multiwriter multireader atomic registers. Unfor...

متن کامل

Bounded time-stamping in message-passing systems

Consider a distributed system running a protocol in which processes exchange information by passing messages. The gossip problem for the protocol is the following: Whenever a process q receives a message from another process p, q must be able to decide which of p and q has more recent information about r, for every other process r in the system. With this data, q is in a position to update its ...

متن کامل

Bounded Concurrent Time - Stamp Systems Are

Danny Dolev Concurrent time stamping is at the heart of solu tions to some of the most fundamental problems in distributed computing. Based on concurrent time-stamp-systems, elegant and simple solu tions to core problems such as fcf,-mutual exclusion, construction of a multi-reader-multi writer atomic register. probabilistic consensus,.. were developed. Unfortunmely, the only known implementati...

متن کامل

A Time-stamping Proxy Signature Scheme Using Time-stamping Service

In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they share a common problem. That is, a verifier cannot ascertain that a proxy signature was signed by the proxy signer during the valid delegation peri...

متن کامل

Time-Stamping for Malaysia

One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SIAM Journal on Computing

سال: 1997

ISSN: 0097-5397,1095-7111

DOI: 10.1137/s0097539790192647