Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Byzantine Fault Tolerance

Encyclopedia of Information Science and Technology, Fourth Edition
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Published in Chapter:
Cyber Security Protection for Online Gaming Applications
Wenbing Zhao (Cleveland State University, USA)
DOI: 10.4018/978-1-5225-2255-3.ch143
Abstract
In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Enhancing the Resiliency of Smart Grid Monitoring and Control
It refers to the capability of a system to tolerate Byzantine faults.
Full Text Chapter Download: US $37.50 Add to Cart
Increasing the Trustworthiness of Collaborative Applications
Full Text Chapter Download: US $37.50 Add to Cart
Increasing the Trustworthiness of Online Gaming Applications
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Intrusion Tolerance Techniques
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Tolerance Techniques
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Full Text Chapter Download: US $37.50 Add to Cart
Byzantine Fault Tolerant Monitoring and Control for Electric Power Grid
It refers to the capability of a system to tolerate Byzantine faults.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing the Resiliency of Smart Grid Monitoring and Control
It refers to the capability of a system to tolerate Byzantine faults.
Full Text Chapter Download: US $37.50 Add to Cart
Toward Trustworthy Web Services Coordination
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Tolerance in Information Systems
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing the Trustworthiness of Web Services Coordination
A replication-based technique used to ensure high availability of an application subject to Byzantine fault.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR