Sciweavers

1081 search results - page 99 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
IUI
2010
ACM
14 years 2 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
SOSP
2007
ACM
14 years 5 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
DEBS
2007
ACM
14 years 24 days ago
Towards a common API for publish/subscribe
Over the last decade a wide range of publish/subscribe (pub/ sub) systems have come out of the research community. However, there is little consensus on a common pub/sub API, whic...
Peter R. Pietzuch, David M. Eyers, Samuel Kounev, ...
CCS
2010
ACM
13 years 9 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
OSDI
2002
ACM
14 years 9 months ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...