{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:07:06Z","timestamp":1769922426117,"version":"3.49.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[1986,3,1]],"date-time":"1986-03-01T00:00:00Z","timestamp":510019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[1986,3]]},"abstract":"<jats:p>In this paper we study when and how B Byzantine agreement protocol can he used in general-purpose database management systems. We present an overview of the failure model used for Byzantine agreement, and of the protocol itself. We then present correctness criteria for database processing in this failure environment and discuss strategies for satisfying them. In doing this, we present new failure models for input\/output nodes and study ways to distribute input transactions to processing nodes under these models. Finally, we investigate applications of Byzantine agreement protocols in the more common failure environment where processors are assumed to halt after a failure.<\/jats:p>","DOI":"10.1145\/5236.5243","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T11:29:00Z","timestamp":1027769340000},"page":"27-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Applications of Byzantine agreement in database systems"],"prefix":"10.1145","volume":"11","author":[{"given":"Hector","family":"Garcia Molina","sequence":"first","affiliation":[{"name":"Princeton Univ., Princeton, NJ"}]},{"given":"Frank","family":"Pittelli","sequence":"additional","affiliation":[{"name":"Princeton Univ., Princeton, NJ"}]},{"given":"Susan","family":"Davidson","sequence":"additional","affiliation":[{"name":"Univ. of Pennsylvania, Philadelphia"}]}],"member":"320","published-online":{"date-parts":[[1986,3]]},"reference":[{"key":"e_1_2_1_1_2","volume-title":"IBM Research Laboratories","author":"AGHILI H.","year":"1983","unstructured":"AGHILI , H. , ET AL . A prototype for a highly available database system. Res. Rep. RJ-3755 , IBM Research Laboratories , Jan. 1983 . AGHILI, H., ET AL. A prototype for a highly available database system. Res. Rep. RJ-3755, IBM Research Laboratories, Jan. 1983."},{"key":"e_1_2_1_2_2","volume-title":"Algebraic Coding Theory","author":"BERLEKAMP E.","year":"1968","unstructured":"BERLEKAMP , E. Algebraic Coding Theory . McGraw-Hill , New York , 1968 . BERLEKAMP, E. Algebraic Coding Theory. McGraw-Hill, New York, 1968."},{"key":"e_1_2_1_3_2","volume-title":"ACM SIGMOD Conference (May","author":"BERNSTEIN P.A.","year":"1983","unstructured":"BERNSTEIN , P.A. What can we expect from database theory? Invited talk , ACM SIGMOD Conference (May 1983 ). BERNSTEIN, P.A. What can we expect from database theory? Invited talk, ACM SIGMOD Conference (May 1983)."},{"key":"e_1_2_1_4_2","volume-title":"An Introduction to Database Systems, vols. 1 and 2","author":"DATE C.J.","year":"1981","unstructured":"DATE , C.J. An Introduction to Database Systems, vols. 1 and 2 , Addison-Wesley , Reading, Mass ., 1981 . DATE, C.J. An Introduction to Database Systems, vols. 1 and 2, Addison-Wesley, Reading, Mass., 1981."},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802215"},{"key":"e_1_2_1_7_2","volume-title":"IBM Research Laboratory","author":"DOLEV D.","year":"1982","unstructured":"DOLEV , D. , AND STRONG , H.R. Authenticated algorithms for Byzantine agreement. IBM Res. Rep. RJ3416 , IBM Research Laboratory , Mar. 1982 . DOLEV, D., AND STRONG, H.R. Authenticated algorithms for Byzantine agreement. IBM Res. Rep. RJ3416, IBM Research Laboratory, Mar. 1982."},{"key":"e_1_2_1_8_2","first-page":"53","volume-title":"Proceedings 2nd Symposium on Reliability in Distributed Software and Database Systems (July","author":"DOLEV D.","year":"1982","unstructured":"DOLEV , D. , AND STRONG , H.R. Distributed commit with bounded waiting . In Proceedings 2nd Symposium on Reliability in Distributed Software and Database Systems (July 1982 ), 53 - 60 . DOLEV, D., AND STRONG, H.R. Distributed commit with bounded waiting. In Proceedings 2nd Symposium on Reliability in Distributed Software and Database Systems (July 1982), 53-60."},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806739"},{"key":"e_1_2_1_11_2","volume-title":"Impossibility of distributed consensus with one faulty process. M{T\/LCS\/Tr-282","author":"FISCHER M.","year":"1982","unstructured":"FISCHER , M. , LYNCH , N. , AND PATERSON , M. Impossibility of distributed consensus with one faulty process. M{T\/LCS\/Tr-282 . Sept. 1982 . FISCHER, M., LYNCH, N., AND PATERSON, M. Impossibility of distributed consensus with one faulty process. M{T\/LCS\/Tr-282. Sept. 1982."},{"key":"e_1_2_1_13_2","author":"GARCIA-MOLINA H.","year":"1982","unstructured":"GARCIA-MOLINA , H. Elections in a distributed computing system. IEEE Trans. Comput. C-31 , I ( Jan. 1982 ). GARCIA-MOLINA, H. Elections in a distributed computing system. IEEE Trans. Comput. C-31, I (Jan. 1982).","journal-title":"IEEE Trans. Comput. C-31"},{"key":"e_1_2_1_14_2","volume-title":"Advanced Course on Operating System Principles","author":"GRAY J.","year":"1977","unstructured":"GRAY , J. Notes on database operating systems . In Advanced Course on Operating System Principles . Technical Univ., Munich , July 1977 . GRAY, J. Notes on database operating systems. In Advanced Course on Operating System Principles. Technical Univ., Munich, July 1977."},{"key":"e_1_2_1_15_2","first-page":"95","volume":"2","author":"LAMPORT L.","year":"1978","unstructured":"LAMPORT , L. The implementation of reliable distributed multiprocess systems. Comput. Netw. 2 ( 1978 ), 95 - 114 . LAMPORT, L. The implementation of reliable distributed multiprocess systems. Comput. Netw. 2 (1978), 95-114.","journal-title":"Comput. Netw."},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2402.322398"},{"key":"e_1_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2993.2994"},{"key":"e_1_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806737"},{"key":"e_1_2_1_21_2","volume-title":"Xerox Res. Memo","author":"LAMPSON B.","year":"1979","unstructured":"LAMPSON , B. , AND STURG i S, H . Crash recovery in a distributed data storage system . Xerox Res. Memo , Apr. 1979 . LAMPSON, B., AND STURGiS, H. Crash recovery in a distributed data storage system. Xerox Res. Memo, Apr. 1979."},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806738"},{"key":"e_1_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA113241"},{"key":"e_1_2_1_24_2","volume-title":"IBM Research Laboratories","author":"MOHAN C.","year":"1983","unstructured":"MOHAN , C. , STRONG , H. R. , AND FINKELSTEIN , S. Method for distributed transaction commit and recovery using Byzantine agreement within clusters of processors. Res. Rep. RJ-3882 , IBM Research Laboratories , June 1983 . MOHAN, C., STRONG, H. R., AND FINKELSTEIN, S. Method for distributed transaction commit and recovery using Byzantine agreement within clusters of processors. Res. Rep. RJ-3882, IBM Research Laboratories, June 1983."},{"key":"e_1_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_2_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/320128.320129"},{"key":"e_1_2_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357371"},{"key":"e_1_2_1_29_2","volume-title":"The Theory and Practice of Reliable System Design","author":"SIEWIOREK D. P.","year":"1982","unstructured":"SIEWIOREK , D. P. , AND SWARZ , R. S. The Theory and Practice of Reliable System Design . Digital Press , Bedford, Mass ., 1982 . SIEWIOREK, D. P., AND SWARZ, R. S. The Theory and Practice of Reliable System Design. Digital Press, Bedford, Mass., 1982."},{"key":"e_1_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234180"},{"key":"e_1_2_1_33_2","volume-title":"Proceedings International Conference on Database Systems (Jerusalem","author":"WILLIAMS R.","year":"1982","unstructured":"WILLIAMS , R. , ET AL . R* : An overview of the architecture . In Proceedings International Conference on Database Systems (Jerusalem , June 1982 ). WILLIAMS, R., ET AL. R*: An overview of the architecture. In Proceedings International Conference on Database Systems (Jerusalem, June 1982)."}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/5236.5243","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/5236.5243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:04Z","timestamp":1750281304000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/5236.5243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1986,3]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1986,3]]}},"alternative-id":["10.1145\/5236.5243"],"URL":"https:\/\/doi.org\/10.1145\/5236.5243","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"value":"0362-5915","type":"print"},{"value":"1557-4644","type":"electronic"}],"subject":[],"published":{"date-parts":[[1986,3]]},"assertion":[{"value":"1986-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}