As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
Resource sharing in priority-based systems can give rise to priority-inversion and blocking, wherein a job’s execution is delayed because a lower-priority job holds some resourc...
The duration of time for which each application locks each shared resource is critically important in composing multiple independently-developed applications upon a shared “open...
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
In this work we present the Internet Backplane Protocol (IBP), a middleware created to allow the sharing of storage resources, implemented as part of the network fabric. IBP allow...
Alessandro Bassi, Micah Beck, Graham E. Fagg, Terr...