The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
The difficult business reality today makes enterprises more and more resort to information technology to manage nearly everything within the enterprises and to conduct business ac...
This paper introduces volume leases as a mechanism for providing cache consistency for large-scale, geographically distributed networks. Volume leases are a variation of leases, w...
Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin L...
Abstract—A major barrier to advancing modern wireless networking research is the lack of an effective wireless network simulation platform that simultaneously offers high fideli...
Tzi-cker Chiueh, Rupa Krishnan, Pradipta De, Jui-H...
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...