共 17 条
- [2] Caudill Herb, 2023, Local First Auth: Decentralized authentication and authorization for team collaboration, using a secure chain of cryptological signatures
- [3] Cholvi V, 2021, Arxiv, DOI arXiv:2103.08936
- [4] Analysis of the Matrix Event Graph Replicated Data Type [J]. IEEE ACCESS, 2021, 9 : 28317 - 28333
- [5] Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 81 - 92
- [6] Jacob Florian, 2022, GI EDITION P, V323, P113, DOI [10.18420/sicherheit202207, DOI 10.18420/SICHERHEIT202207]
- [7] Kleppmann M, 2020, Arxiv, DOI arXiv:2012.00472
- [8] Making CRDTs Byzantine Fault Tolerant [J]. PAPOC'22: PROCEEDINGS OF THE 9TH PRINCIPLES AND PRACTICE OF CONSISTENCY FOR DISTRIBUTED DATA, 2022, : 8 - 15
- [9] Lamport L., 2019, Time, Clocks, and the Ordering of Events in a Distributed System, P179, DOI DOI 10.1145/3335772.3335934
- [10] Matrix Specification Contributors, 2023, v1.6. Matrix specification Technical Report