Skip to main content

Secure group membership protocol

Publication ,  Conference
Reiter, MK
Published in: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
January 1, 1994

A group membership protocol enables processes in a distributed system to agree on a group of processes that are currently operational. Membership protocols are a core component of many distributed systems and have proved to be fundamental for maintaining availability and consistency in distributed applications. In this paper we present a membership protocol for asynchronous distributed systems that tolerates the malicious corruption of group members. Our protocol ensures that correct members control and consistently observe changes to the group membership, provided that in each instance of the group membership, fewer than one-third of the members are corrupted or fail benignly. The protocol has many potential applications in secure systems and, in particular, is a central component of a toolkit for constructing high-integrity distributed services that we are presently implementing.

Duke Scholars

Published In

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ISSN

1063-7109

Publication Date

January 1, 1994

Start / End Page

175 / 189
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. K. (1994). Secure group membership protocol. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (pp. 175–189).
Reiter, M. K. “Secure group membership protocol.” In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 175–89, 1994.
Reiter MK. Secure group membership protocol. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1994. p. 175–89.
Reiter, M. K. “Secure group membership protocol.” Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1994, pp. 175–89.
Reiter MK. Secure group membership protocol. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1994. p. 175–189.

Published In

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ISSN

1063-7109

Publication Date

January 1, 1994

Start / End Page

175 / 189