Bounded Concurrent Time-Stamping
نویسندگان
چکیده
منابع مشابه
Bounded Concurrent Time-Stamping
We introduce concurrent time-stamping, a paradigm that allows processes to temporally order concurrent events in an asynchronous shared-memory system. Concurrent time-stamp systems are powerful tools for concurrency control, serving as the basis for solutions to coordination problems such as mutual exclusion, `-exclusion, randomized consensus, and multiwriter multireader atomic registers. Unfor...
متن کاملBounded time-stamping in message-passing systems
Consider a distributed system running a protocol in which processes exchange information by passing messages. The gossip problem for the protocol is the following: Whenever a process q receives a message from another process p, q must be able to decide which of p and q has more recent information about r, for every other process r in the system. With this data, q is in a position to update its ...
متن کاملBounded Concurrent Time - Stamp Systems Are
Danny Dolev Concurrent time stamping is at the heart of solu tions to some of the most fundamental problems in distributed computing. Based on concurrent time-stamp-systems, elegant and simple solu tions to core problems such as fcf,-mutual exclusion, construction of a multi-reader-multi writer atomic register. probabilistic consensus,.. were developed. Unfortunmely, the only known implementati...
متن کاملA Time-stamping Proxy Signature Scheme Using Time-stamping Service
In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they share a common problem. That is, a verifier cannot ascertain that a proxy signature was signed by the proxy signer during the valid delegation peri...
متن کاملTime-Stamping for Malaysia
One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SIAM Journal on Computing
سال: 1997
ISSN: 0097-5397,1095-7111
DOI: 10.1137/s0097539790192647