{"id":"https://openalex.org/W2099533341","doi":"https://doi.org/10.1145/2524224.2524233","title":"Towards privacy-preserving fault detection","display_name":"Towards privacy-preserving fault detection","publication_year":2013,"publication_date":"2013-11-03","ids":{"openalex":"https://openalex.org/W2099533341","doi":"https://doi.org/10.1145/2524224.2524233","mag":"2099533341"},"language":"en","primary_location":{"id":"doi:10.1145/2524224.2524233","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2524224.2524233","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061266032","display_name":"Antonis Papadimitriou","orcid":null},"institutions":[{"id":"https://openalex.org/I36788626","display_name":"California University of Pennsylvania","ror":"https://ror.org/01spssf70","country_code":"US","type":"education","lineage":["https://openalex.org/I36788626"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Antonis Papadimitriou","raw_affiliation_strings":["University of Pennsylvania","#N# * University of Pennsylvania"],"affiliations":[{"raw_affiliation_string":"University of Pennsylvania","institution_ids":["https://openalex.org/I36788626"]},{"raw_affiliation_string":"#N# * University of Pennsylvania","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113914006","display_name":"Mingchen Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I36788626","display_name":"California University of Pennsylvania","ror":"https://ror.org/01spssf70","country_code":"US","type":"education","lineage":["https://openalex.org/I36788626"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingchen Zhao","raw_affiliation_strings":["University of Pennsylvania","#N# * University of Pennsylvania"],"affiliations":[{"raw_affiliation_string":"University of Pennsylvania","institution_ids":["https://openalex.org/I36788626"]},{"raw_affiliation_string":"#N# * University of Pennsylvania","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057845948","display_name":"Andreas Haeberlen","orcid":"https://orcid.org/0000-0002-3271-8354"},"institutions":[{"id":"https://openalex.org/I36788626","display_name":"California University of Pennsylvania","ror":"https://ror.org/01spssf70","country_code":"US","type":"education","lineage":["https://openalex.org/I36788626"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andreas Haeberlen","raw_affiliation_strings":["University of Pennsylvania","#N# * University of Pennsylvania"],"affiliations":[{"raw_affiliation_string":"University of Pennsylvania","institution_ids":["https://openalex.org/I36788626"]},{"raw_affiliation_string":"#N# * University of Pennsylvania","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061266032"],"corresponding_institution_ids":["https://openalex.org/I36788626"],"apc_list":null,"apc_paid":null,"fwci":0.9885,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.83201626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8180307149887085},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7660627961158752},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7653185129165649},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7280651330947876},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.650140643119812},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4704379439353943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4446497857570648},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3960754871368408},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09125125408172607},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08038148283958435},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06501427292823792}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8180307149887085},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7660627961158752},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7653185129165649},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7280651330947876},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.650140643119812},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4704379439353943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4446497857570648},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3960754871368408},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09125125408172607},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08038148283958435},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06501427292823792},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2524224.2524233","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2524224.2524233","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.393.1800","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.393.1800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cis.upenn.edu/~ahae/papers/privacy-hotdep2013.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[{"id":"https://openalex.org/G2904454286","display_name":null,"funder_award_id":"CNS-1054229, CNS-1065130","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G5271293121","display_name":null,"funder_award_id":"FA8650-11-C-7189","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309327","display_name":"Google","ror":"https://ror.org/00njsd438"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W266855186","https://openalex.org/W1483086566","https://openalex.org/W1528076390","https://openalex.org/W1538440442","https://openalex.org/W1555220698","https://openalex.org/W1858287302","https://openalex.org/W1930567086","https://openalex.org/W1949459993","https://openalex.org/W1963279632","https://openalex.org/W2005725110","https://openalex.org/W2018746447","https://openalex.org/W2022205872","https://openalex.org/W2041068798","https://openalex.org/W2092422002","https://openalex.org/W2093507182","https://openalex.org/W2096270679","https://openalex.org/W2101416775","https://openalex.org/W2102239128","https://openalex.org/W2103514812","https://openalex.org/W2116021422","https://openalex.org/W2128906841","https://openalex.org/W2131053137","https://openalex.org/W2144752539","https://openalex.org/W2166618966","https://openalex.org/W2169657197","https://openalex.org/W2339351027","https://openalex.org/W2396250457","https://openalex.org/W2402869180","https://openalex.org/W3137092842","https://openalex.org/W4248358572","https://openalex.org/W4296313421"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W4394650907"],"abstract_inverted_index":{"In":[0],"this":[1,24],"paper,":[2],"we":[3,35],"discuss":[4],"the":[5,29,48,77,80],"problem":[6],"of":[7,31,69,82],"detecting":[8],"general":[9],"faults":[10,20],"in":[11,23,72],"distributed":[12,74],"systems":[13],"that":[14,44],"handle":[15],"confidential":[16,49],"information.":[17,50],"Detecting":[18],"non-crash":[19],"is":[21],"difficult":[22,55],"setting":[25],"because,":[26],"to":[27,37,56,62],"check":[28],"behavior":[30,41],"a":[32,66,83],"given":[33],"node,":[34],"need":[36],"know":[38],"its":[39],"expected":[40],"--":[42],"but":[43,71],"can":[45],"depend":[46],"on":[47],"Classical":[51],"zero-knowledge":[52],"proofs":[53],"are":[54,60,94],"apply":[57],"because":[58],"they":[59],"designed":[61],"verify":[63],"functions":[64],"with":[65],"fixed":[67],"number":[68,81],"inputs,":[70],"many":[73],"systems,":[75],"both":[76],"size":[78],"and":[79],"node's":[84],"\"inputs\"":[85],"(the":[86],"messages":[87],"it":[88],"has":[89],"received":[90],"from":[91],"other":[92],"nodes)":[93],"not":[95],"known.":[96]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
