Page 300 - 《软件学报》2020年第9期
P. 300
张志威 等:区块链的数据管理技术综述 2921
[26] Jakobsson M, Juels A. Proofs of work and bread pudding protocols. In: Proc. of the IFIP TC6/TC11 Joint Working Conf. on Secure
Information Networks: Communications and Multimedia Security (CMS’99). 1999. 258−272.
[27] Castro M, Liskov B. Practical Byzantine fault tolerance. In: Proc. of the 3rd Symp. on Operating Systems Design and
Implementation (OSDI’99). Berkeley: USENIX Association, 1999. 173−186.
[28] Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J. Untangling blockchain: A data processing view of blockchain systems.
IEEE Transactions on Knowledge and Data Engineering, 2018,30(7):1366−1385.
[29] Maiyya S, Zakhary V, Amiri MJ, Agrawal D, El Abbadi A. Database and distributed computing foundations of blockchains. In:
Proc. of the 2019 Int’l Conf. on Management of Data (SIGMOD 2019). New York: ACM, 2019. 2036−2041.
[30] Baig F, Wang F. Blockchain enabled distributed data management—A vision. In: Proc. of the 35th IEEE Int’l Conf. on Data
Engineering Workshops (ICDE Workshops 2019). Macao, 2019. 28−30.
[31] Mohan C. State of public and private blockchains: Myths and reality. In: Proc. of the 2019 Int’l Conf. on Management of Data
(SIGMOD 2019). New York: ACM, 2019. 404−411.
[32] Alsberg PA, Day JD. A principle for resilient sharing of distributed resources. In: Proc. of the 2nd Int’l Conf. on Software
Engineering (ICSE’76). Los Alamitos: IEEE Computer Society Press, 1976. 562−570.
[33] Stonebraker MR. Distributed systems, vol.ii: Distributed database systems. In: Chu WW, Norwood, MA, eds. Proc. of the
Concurrency Control and Consistency of Multiple Copies of Data in Distributed INGRES. Artech House, Inc., 1986. 193−199.
[34] Cecchet E, Candea G, Ailamaki A. Middleware-based database replication: The gaps between theory and practice. In: Proc. of the
2008 ACM SIGMOD Int’l Conf. on Management of Data (SIGMOD 2008). New York: ACM, 2008. 739−752.
[35] Wiesmann M, Pedone F, Schiper A, Kemme B, Alonso G. Understanding replication in databases and distributed systems. In: Proc.
of the 20th Int’l Conf. on Distributed Computing Systems (ICDCS 2000). Washington: IEEE Computer Society, 2000.
[36] Liu AD, Du XH, Wang N, Li SZ. Research progress of blockchain technology and its application in information security. Ruan Jian
Xue Bao/Journal of Software, 2018,29(7):2092−2115 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5589.
htm [doi: 10.13328/j.cnki.jos.005589]
[37] Qian WN, Shao QF, Zhu YC, Jin CQ, Zhou AY. Research problems and methods in blockchain and trusted data management. Ruan
Jian Xue Bao/Journal of Software, 2018,29(1):150−159 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5434.
htm [doi: 10. 13328/j.cnki.jos.005434]
[38] Shao QF, Jin CQ, Zhang Z, Qian WN, Zhou AY. Blockchain: Architecture and research progress. Chinese Journal of Computers,
2018,41(5):969−988 (in Chinese with English abstract).
[39] Fan JL, Li XH, Nie TZ, Yu G. Survey on smart contract based on blockchain system. Computer Science, 2019,46(11):1−10 (in
Chinese with English abstract).
[40] He HW, Yan A, Chen ZH. Survey of smart contract technology and application based on blockchain. Journal of Computer Research
and Development, 2018,55(11):2452−2466 (in Chinese with English abstract).
[41] Liu AD, Du XH, Wang N, Li SZ. Blockchain-based access control mechanism for big data. Ruan Jian Xue Bao/Journal of Software,
2019,30(9):2636−2654 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6091.htm [doi: 10.13328/j.cnki.jos.
005771]
[42] Wang QG, He P, Nie TZ, Shen DR, Yu G. Survey of data storage and query techniques in blockchain systems. Computer Science,
2018,45(12):12−18 (in Chinese with English abstract).
[43] Merkle RC. A certified digital signature. In: Proc. of the Advances in Cryptology (CRYPTO’89). New York: Springer-Verlag, 1989.
218−238.
[44] Puddu I, Dmitrienko A, Capkun S. How to forget without hard forks. IACR Cryptology ePrint Archive, 2017.
[45] Vukolić M. The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In: Camenisch J, Kesdogăn D, eds. Proc. of
the Open Problems in Network Security. Cham: Springer Int’l Publishing, 2016. 112−125.
[46] Douceur JR. The sybil attack. In: Proc. of the Revised Papers from the 1st Int’l Workshop on Peer-to-Peer Systems (IPTPS 2001).
London: Springer-Verlag, 2002. 251−260.
[47] Rosenfeld M. Analysis of hashrate-based double spending. CoRR, vol. abs/1402.2009, 2014.