Page 300 - 《软件学报》2020年第9期
P. 300

张志威  等:区块链的数据管理技术综述                                                              2921


         [26]    Jakobsson M, Juels A. Proofs of work and bread pudding protocols. In: Proc. of the IFIP TC6/TC11 Joint Working Conf. on Secure
             Information Networks: Communications and Multimedia Security (CMS’99). 1999. 258−272.
         [27]    Castro  M,  Liskov  B. Practical  Byzantine fault  tolerance.  In: Proc. of the 3rd Symp.  on Operating Systems  Design  and
             Implementation (OSDI’99). Berkeley: USENIX Association, 1999. 173−186.
         [28]    Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J. Untangling blockchain: A data processing view of blockchain systems.
             IEEE Transactions on Knowledge and Data Engineering, 2018,30(7):1366−1385.
         [29]    Maiyya S, Zakhary V, Amiri MJ, Agrawal D, El Abbadi A. Database and distributed computing foundations of blockchains. In:
             Proc. of the 2019 Int’l Conf. on Management of Data (SIGMOD 2019). New York: ACM, 2019. 2036−2041.
         [30]    Baig F,  Wang F.  Blockchain  enabled distributed data  management—A vision. In: Proc. of the 35th IEEE Int’l  Conf. on  Data
             Engineering Workshops (ICDE Workshops 2019). Macao, 2019. 28−30.
         [31]    Mohan C. State of public and private blockchains: Myths and reality. In: Proc. of the 2019 Int’l Conf. on Management of Data
             (SIGMOD 2019). New York: ACM, 2019. 404−411.
         [32]    Alsberg PA,  Day  JD.  A principle  for resilient  sharing of distributed resources. In: Proc. of  the 2nd Int’l  Conf. on Software
             Engineering (ICSE’76). Los Alamitos: IEEE Computer Society Press, 1976. 562−570.
         [33]    Stonebraker  MR.  Distributed systems, vol.ii:  Distributed database systems.  In: Chu  WW, Norwood, MA,  eds. Proc. of the
             Concurrency Control and Consistency of Multiple Copies of Data in Distributed INGRES. Artech House, Inc., 1986. 193−199.
         [34]    Cecchet E, Candea G, Ailamaki A. Middleware-based database replication: The gaps between theory and practice. In: Proc. of the
             2008 ACM SIGMOD Int’l Conf. on Management of Data (SIGMOD 2008). New York: ACM, 2008. 739−752.
         [35]    Wiesmann M, Pedone F, Schiper A, Kemme B, Alonso G. Understanding replication in databases and distributed systems. In: Proc.
             of the 20th Int’l Conf. on Distributed Computing Systems (ICDCS 2000). Washington: IEEE Computer Society, 2000.
         [36]    Liu AD, Du XH, Wang N, Li SZ. Research progress of blockchain technology and its application in information security. Ruan Jian
             Xue  Bao/Journal of Software, 2018,29(7):2092−2115 (in  Chinese with English  abstract). http://www.jos.org.cn/1000-9825/5589.
             htm [doi: 10.13328/j.cnki.jos.005589]
         [37]    Qian WN, Shao QF, Zhu YC, Jin CQ, Zhou AY. Research problems and methods in blockchain and trusted data management. Ruan
             Jian Xue Bao/Journal of Software, 2018,29(1):150−159 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5434.
             htm [doi: 10. 13328/j.cnki.jos.005434]
         [38]    Shao QF, Jin CQ, Zhang Z, Qian WN, Zhou AY. Blockchain: Architecture and research progress. Chinese Journal of Computers,
             2018,41(5):969−988 (in Chinese with English abstract).
         [39]    Fan JL, Li XH, Nie TZ, Yu G. Survey on smart contract based on blockchain system. Computer Science, 2019,46(11):1−10 (in
             Chinese with English abstract).
         [40]    He HW, Yan A, Chen ZH. Survey of smart contract technology and application based on blockchain. Journal of Computer Research
             and Development, 2018,55(11):2452−2466 (in Chinese with English abstract).
         [41]    Liu AD, Du XH, Wang N, Li SZ. Blockchain-based access control mechanism for big data. Ruan Jian Xue Bao/Journal of Software,
             2019,30(9):2636−2654 (in  Chinese  with English  abstract). http://www.jos.org.cn/1000-9825/6091.htm [doi: 10.13328/j.cnki.jos.
             005771]
         [42]    Wang QG, He P, Nie TZ, Shen DR, Yu G. Survey of data storage and query techniques in blockchain systems. Computer Science,
             2018,45(12):12−18 (in Chinese with English abstract).
         [43]    Merkle RC. A certified digital signature. In: Proc. of the Advances in Cryptology (CRYPTO’89). New York: Springer-Verlag, 1989.
             218−238.
         [44]    Puddu I, Dmitrienko A, Capkun S. How to forget without hard forks. IACR Cryptology ePrint Archive, 2017.
         [45]    Vukolić M. The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In: Camenisch J, Kesdogăn D, eds. Proc. of
             the Open Problems in Network Security. Cham: Springer Int’l Publishing, 2016. 112−125.
         [46]    Douceur JR. The sybil attack. In: Proc. of the Revised Papers from the 1st Int’l Workshop on Peer-to-Peer Systems (IPTPS 2001).
             London: Springer-Verlag, 2002. 251−260.
         [47]    Rosenfeld M. Analysis of hashrate-based double spending. CoRR, vol. abs/1402.2009, 2014.
   295   296   297   298   299   300   301   302   303   304   305