Sciweavers

909 search results - page 116 / 182
» Semantically-Smart Disk Systems
Sort
View
OSDI
2008
ACM
14 years 9 months ago
Device Driver Safety Through a Reference Validation Mechanism
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them withou...
Dan Williams, Emin Gün Sirer, Fred B. Schneid...
PACS
2004
Springer
306views Hardware» more  PACS 2004»
14 years 2 months ago
Power Consumption Breakdown on a Modern Laptop
The purpose of this work was to obtain a componentwise breakdown of the power consumption a modern laptop. We measured the power usage of the key components in an IBM ThinkPad R40...
Aqeel Mahesri, Vibhore Vardhan
WISA
2004
Springer
14 years 2 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
MSS
2000
IEEE
84views Hardware» more  MSS 2000»
14 years 1 months ago
An Overview of Version 0.9.5 Proposed SCSI Device Locks
Symmetric shared disks file systems are functional, versatile, and just plain cool. For these file systems to work, they require a global lock space, acessable to all clients. T...
Andrew P. Barry, Mike Tilstra, Matthew T. O'Keefe,...
SICHERHEIT
2010
13 years 6 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...