{"id":"https://openalex.org/W2093850293","doi":"https://doi.org/10.1145/1805974.1805981","title":"On the consistency of distributed proofs with hidden subtrees","display_name":"On the consistency of distributed proofs with hidden subtrees","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2093850293","doi":"https://doi.org/10.1145/1805974.1805981","mag":"2093850293"},"language":"en","primary_location":{"id":"doi:10.1145/1805974.1805981","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1805974.1805981","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032842781","display_name":"Adam J. Lee","orcid":"https://orcid.org/0000-0002-2596-7256"},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adam J. Lee","raw_affiliation_strings":["University of Pittsburgh, Pittsburgh, PA","[University of Pittsburgh, Pittsburgh, PA]"],"affiliations":[{"raw_affiliation_string":"University of Pittsburgh, Pittsburgh, PA","institution_ids":["https://openalex.org/I170201317"]},{"raw_affiliation_string":"[University of Pittsburgh, Pittsburgh, PA]","institution_ids":["https://openalex.org/I170201317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050712667","display_name":"Kazuhiro Minami","orcid":"https://orcid.org/0000-0003-4058-1762"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kazuhiro Minami","raw_affiliation_strings":["University of Illinois at Urbana-Champaign","University of Illinois at Urbana Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011314280","display_name":"Marianne Winslett","orcid":"https://orcid.org/0000-0002-3935-7168"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marianne Winslett","raw_affiliation_strings":["University of Illinois at Urbana-Champaign","University of Illinois at Urbana Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"University of Illinois at Urbana Champaign","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032842781"],"corresponding_institution_ids":["https://openalex.org/I170201317"],"apc_list":null,"apc_paid":null,"fwci":0.984,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86350772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"13","issue":"3","first_page":"1","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8659838438034058},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7307305335998535},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6954297423362732},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5746096968650818},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5129318237304688},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.48363029956817627},{"id":"https://openalex.org/keywords/snapshot","display_name":"Snapshot (computer storage)","score":0.43899446725845337},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42278972268104553},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.381896048784256},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10661667585372925}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8659838438034058},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7307305335998535},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6954297423362732},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5746096968650818},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5129318237304688},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.48363029956817627},{"id":"https://openalex.org/C55282118","wikidata":"https://www.wikidata.org/wiki/Q252683","display_name":"Snapshot (computer storage)","level":2,"score":0.43899446725845337},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42278972268104553},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.381896048784256},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10661667585372925},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/1805974.1805981","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1805974.1805981","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:d-scholarship.pitt.edu:16450","is_oa":false,"landing_page_url":"http://d-scholarship.pitt.edu/16450/1/licence.txt","pdf_url":null,"source":{"id":"https://openalex.org/S4306402375","display_name":"D-Scholarship@Pitt (University of Pittsburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I170201317","host_organization_name":"University of Pittsburgh","host_organization_lineage":["https://openalex.org/I170201317"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.189.3488","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.3488","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.uiuc.edu/homes/minami/papers/lee_tissec09.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.703.7243","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.703.7243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.cs.pitt.edu/%7Eadamlee/pubs/2010/lee2010tissec.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.875.8287","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.875.8287","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://tcipg.org/sites/default/files/papers/2009_Lee_Minami_Winslett.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1423499882","display_name":null,"funder_award_id":"DOE SNL 541065","funder_id":"https://openalex.org/F4320338291","funder_display_name":"Sandia National Laboratories"},{"id":"https://openalex.org/G1753748053","display_name":null,"funder_award_id":"IIS-0331707CNS-0325951CNS-0524695","funder_id":"https://openalex.org/F4320337389","funder_display_name":"Division of Information and Intelligent Systems"},{"id":"https://openalex.org/G2263356457","display_name":null,"funder_award_id":"IIS-0331707CNS-0325951CNS-0524695","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320337389","display_name":"Division of Information and Intelligent Systems","ror":"https://ror.org/053a2cp42"},{"id":"https://openalex.org/F4320338291","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1501620459","https://openalex.org/W1508143344","https://openalex.org/W1529718300","https://openalex.org/W1852513433","https://openalex.org/W1966986089","https://openalex.org/W1993505169","https://openalex.org/W1998208223","https://openalex.org/W2000952251","https://openalex.org/W2008524185","https://openalex.org/W2029601347","https://openalex.org/W2077298707","https://openalex.org/W2083004560","https://openalex.org/W2095202767","https://openalex.org/W2099824006","https://openalex.org/W2111887123","https://openalex.org/W2124056896","https://openalex.org/W2124260419","https://openalex.org/W2130103312","https://openalex.org/W2131053137","https://openalex.org/W2131709641","https://openalex.org/W2138916465","https://openalex.org/W2140166593","https://openalex.org/W2144279894","https://openalex.org/W2147432139","https://openalex.org/W2150500287","https://openalex.org/W2290132939","https://openalex.org/W2466575204","https://openalex.org/W2916086000","https://openalex.org/W3093384223","https://openalex.org/W3143338349","https://openalex.org/W3143968418","https://openalex.org/W3145042860","https://openalex.org/W4229838822"],"related_works":["https://openalex.org/W2808944898","https://openalex.org/W4254119641","https://openalex.org/W3196207352","https://openalex.org/W2951724202","https://openalex.org/W3084261076","https://openalex.org/W1996614773","https://openalex.org/W4387820098","https://openalex.org/W2542847180","https://openalex.org/W2576399385","https://openalex.org/W2963408011"],"abstract_inverted_index":{"Previous":[0],"work":[1,37],"has":[2],"shown":[3],"that":[4,8,142,190],"distributed":[5,118,139,181],"authorization":[6],"systems":[7,41,84,120],"fail":[9],"to":[10,24,58,96,100,136,149,177],"sample":[11],"a":[12,25,91,187],"consistent":[13],"snapshot":[14],"of":[15,27,54,90,107,117,146,195],"the":[16,30,50,59,87,97,105,155,162,192],"underlying":[17],"system":[18,141],"during":[19,49],"policy":[20],"evaluation":[21],"are":[22,121],"vulnerable":[23],"number":[26],"attacks.":[28],"Unfortuantely,":[29],"consistency":[31,77,147,197],"enforcement":[32,198],"solutions":[33],"presented":[34],"in":[35,42,82,85,126],"previous":[36,69],"were":[38],"designed":[39],"for":[40,110,124],"which":[43,55,76,86],"only":[44],"CA-certified":[45],"evidence":[46,112],"is":[47,56,113],"used":[48],"decision-making":[51,60],"process,":[52],"all":[53],"available":[57],"node":[61],"at":[62],"runtime.":[63],"In":[64],"this":[65],"article,":[66],"we":[67,185],"generalize":[68],"results":[70],"and":[71,104,129,158,175],"present":[72,134],"light-weight":[73],"mechanisms":[74],"through":[75],"constraints":[78,148],"can":[79,172],"be":[80,94,150,173],"enforced":[81,151],"proof":[83,92,119,140,164,182],"full":[88],"details":[89],"may":[93],"unavailable":[95],"querier":[98],"due":[99],"information":[101],"release":[102],"policies,":[103],"existence":[106],"certificate":[108],"authorities":[109],"certifying":[111],"unlikely;":[114],"these":[115,170],"types":[116,145],"likely":[122],"candidates":[123],"use":[125],"pervasive":[127],"computing":[128],"sensor":[130],"network":[131],"environments.":[132],"We":[133,166],"modifications":[135],"one":[137],"such":[138],"enable":[143],"three":[144],"while":[152],"still":[153],"respecting":[154],"same":[156],"confidentiality":[157],"integrity":[159],"policies":[160],"as":[161],"original":[163],"system.":[165],"then":[167],"discuss":[168],"how":[169],"techniques":[171],"adapted":[174],"applied":[176],"other,":[178],"less":[179],"restrictive,":[180],"systems.":[183],"Further,":[184],"detail":[186],"performance":[188],"analysis":[189],"illustrates":[191],"modest":[193],"overheads":[194],"our":[196],"schemes.":[199]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
