Sciweavers

SIGOPSE
2004
ACM
14 years 3 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
SIGOPSE
2004
ACM
14 years 3 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
SIGOPSE
2004
ACM
14 years 3 months ago
The lonely NATed node
In this paper we take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATe...
Chad Yoshikawa, Brent N. Chun, Amin Vahdat, Fred S...
SIGOPSE
2004
ACM
14 years 3 months ago
When physical is not real enough
This position paper argues that policies for physical memory management and for memory power mode control should be relocated to the system software of a programmable memory manag...
Frank Bellosa
SIGOPSE
2004
ACM
14 years 3 months ago
Separating durability and availability in self-managed storage
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
Geoffrey Lefebvre, Michael J. Feeley
Operating System
Top of PageReset Settings