Sciweavers

1744 search results - page 174 / 349
» The Steganographic File System
Sort
View
COMPSAC
2001
IEEE
15 years 7 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
OSDI
2006
ACM
16 years 4 months ago
The Chubby Lock Service for Loosely-Coupled Distributed Systems
We describe our experiences with the Chubby lock service, which is intended to provide coarse-grained locking as well as reliable (though low-volume) storage for a loosely-coupled...
Michael Burrows
CSE
2009
IEEE
15 years 7 months ago
Optimization of Component Connections for an Embedded Component System
Software component techniques are widely used to enhance productivity and reduce the cost of software systems development. This paper proposes optimization of component connections...
Takuya Azumi, Hiroaki Takada, Hiroshi Oyama
GECON
2007
Springer
153views Business» more  GECON 2007»
15 years 7 months ago
Managing a Peer-to-Peer Backup System: Does Imposed Fairness Socially Outperform a Revenue-Driven Monopoly?
We study a peer-to-peer backup system, where users offer some of their storage space to provide service for the others. The economic model for such a system is different from the o...
László Toka, Patrick Maillé
ENTCS
2010
130views more  ENTCS 2010»
15 years 3 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...