Authenticating Operation-Based History in Collaborative Systems

dc.contributor.authorTruong, Hien Thi Thu
dc.contributor.authorIgnat, Claudia-Lavinia
dc.contributor.authorMolli, Pascal
dc.date.accessioned2023-06-08T11:45:07Z
dc.date.available2023-06-08T11:45:07Z
dc.date.issued2012
dc.description.abstractWithin last years multi-synchronous collaborative editing systems became widely used. Multi-synchronous collaboration maintains multiple, simultaneous streams of activity which continually diverge and synchronized. These streams of activity are represented by means of logs of operations, i.e. user modifications. A malicious user might tamper his log of operations. At the moment of synchronization with other streams, the tampered log might generate wrong results. In this paper, we propose a solution relying on hash-chain based authenticators for authenticating logs that ensure the authenticity, the integrity of logs, and the user accountability. We present algorithms to construct authenticators and verify logs. We prove their correctness and provide theoretical and practical evaluations.en
dc.identifier.doi10.1145/2389176.2389197
dc.identifier.urihttps://dl.eusset.eu/handle/20.500.12015/4925
dc.language.isoen
dc.publisherAssociation for Computing Machinery
dc.relation.ispartofProceedings of the 2012 ACM International Conference on Supporting Group Work
dc.subjectoptimistic replication
dc.subjectauthenticators
dc.subjectauthenticating logs
dc.subjectmulti-synchronous collaboration
dc.subjectoperation-based history
dc.subjectlogs
dc.titleAuthenticating Operation-Based History in Collaborative Systemsen
gi.citation.publisherPlaceNew York, NY, USA
gi.citation.startPage131–140
gi.conference.locationSanibel Island, Florida, USA

Files

Collections