Balalaie, A., Heydarnoori, A., & Jamshidi, P. (2016). Microservices Architecture Enables DevOps: Migration to a Cloud-Native Architecture. In IEEE Software (33(3), pp. 42–52). USA: IEEE. https://doi.org/10.1109/MS.2016.64
DOI: https://doi.org/10.1109/MS.2016.64
Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & Thayer, R. (2007, November). OpenPGP Message Format. Retrieved from https://tools.ietf.org/pdf/rfc4880.pdf
DOI: https://doi.org/10.17487/rfc4880
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., & Polk, W. (2008, May). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Retrieved from https://www.rfc-editor.org/rfc/pdfrfc/rfc5280.txt.pdf
DOI: https://doi.org/10.17487/rfc5280
Courtois, P. J., Heymans, F., & Parnas, D. L. (1971). Concurrent control with readers and writers. Communications of the ACM, 14(10), 667-668. https://doi.org/10.1145/362759.362813
DOI: https://doi.org/10.1145/362759.362813
Davidson, S., Garcia-Molina, H., & Skeen, D. (1985). Consistency In A Partitioned Network: A Survey. ACM Computing Surveys, 17(3), 341–370. https://doi.org/10.1145/5505.5508
DOI: https://doi.org/10.1145/5505.5508
Dinemic code repositories, (n.d.). Retrieved February 1, 2018, from https://github.com/cloudOver/libdinemic
Dinemic project, (n.d.). Retrieved February 1, 2018, from https://dinemic.io
DM-Crypt project, (n.d.). Retrieved February 1, 2018, from http://www.saout.de/misc/dm-crypt
Eyal, I. (2017). Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities. In Computer (50(9), pp. 38–49). USA: IEEE. https://doi.org/10.1109/MC.2017.3571042
DOI: https://doi.org/10.1109/MC.2017.3571042
Federal Information Processing Standards. (2002). Secure Hash Signature Standard (SHS) (FIPS PUB 180-2).
Fernstrom, C., Narfelt, K.-H., & Ohlsson, L. (1992). Software factory principles, architecture, and experiments. In IEEE Software (9(2), 36–44). USA: IEEE. https://doi.org/10.1109/52.120600
DOI: https://doi.org/10.1109/52.120600
GNU Privacy Guard project, (n.d.). Retrieved February 1, 2018, from https://www.gnupg.org/
Lippman, S. B. (1996). Inside the C++ Object Model, 1st edition. USA: Addison-Wesley Professional.
Meetup group Crypto@Cracow. (2016). Retrieved February 1, 2018, from https://www.meetup.com/plPL/Crypto-Cracow/
Nakamoto, S. (2008, October). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
Polish Linux Users Group. (2000). Retrieved February 1, 2018, from https://linux.org.pl
Proof of work explanation, Bitcoin project documentation. (2008). Retrieved February 1, 2018, from https://en.bitcoin.it/wiki/Proof_of_work
Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. In IEEE Communications Surveys & Tutorials IEEE. (18(3), pp. 2084–2123). USA: IEEE. https://doi.org/10.1109/COMST.2016.2535718
DOI: https://doi.org/10.1109/COMST.2016.2535718
Viennot, N., Lecuyer, M., Bell, J., Geambasu, R., & Nieh, J. (2015). Synapse: a microservices architecture for heterogeneous-database web applications. In EuroSys’15, Proceedings of the Tenth European Conference on Computer Systems, Article No. 21. USA, New York: ACM. https://doi.org/10.1145/2741948.2741975
DOI: https://doi.org/10.1145/2741948.2741975
Wood, G. (2014). Ethereum: a secure decentralised generalised transaction ledger. Retrieved from http://gavwood.com/Paper.pdf
Zhang, Z., & Zhang, Ch. (2004). Basics of Agents and Multi-agent Systems. In Agent-Based Hybrid Intelligent Systems. Lecture Notes in Computer Science (pp. 29–33). Berlin: Springer.
DOI: https://doi.org/10.1007/978-3-540-24623-7_3