Item

Authenticating Operation-Based History in Collaborative Systems

Loading...
Thumbnail Image

Fulltext URI

Document type

Additional Information

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Association for Computing Machinery

Abstract

Within last years multi-synchronous collaborative editing systems became widely used. Multi-synchronous collaboration maintains multiple, simultaneous streams of activity which continually diverge and synchronized. These streams of activity are represented by means of logs of operations, i.e. user modifications. A malicious user might tamper his log of operations. At the moment of synchronization with other streams, the tampered log might generate wrong results. In this paper, we propose a solution relying on hash-chain based authenticators for authenticating logs that ensure the authenticity, the integrity of logs, and the user accountability. We present algorithms to construct authenticators and verify logs. We prove their correctness and provide theoretical and practical evaluations.

Description

Truong, Hien Thi Thu; Ignat, Claudia-Lavinia; Molli, Pascal (2012): Authenticating Operation-Based History in Collaborative Systems. Proceedings of the 2012 ACM International Conference on Supporting Group Work. DOI: 10.1145/2389176.2389197. New York, NY, USA: Association for Computing Machinery. pp. 131–140. Sanibel Island, Florida, USA

Keywords

optimistic replication, authenticators, authenticating logs, multi-synchronous collaboration, operation-based history, logs

Citation

URI

Collections

Endorsement

Review

Supplemented By

Referenced By


Load citations
Please note: Providing information about citations is only possible thanks to to the open metadata APIs provided by crossref.org and opencitations.net. These lists may be incomplete due to unavailable citation data.