Sciweavers

IEEEIA
2009
13 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
PVLDB
2008
128views more  PVLDB 2008»
13 years 3 months ago
Implementing filesystems by tree-aware DBMSs
With the rise of XML, the database community has been challenged by semi-structured data processing. Since the data type behind XML is the tree, state-of-the-art RDBMSs have learn...
Alexander Holupirek, Marc H. Scholl
GRID
2006
Springer
13 years 4 months ago
Operating System Support for Space Allocation in Grid Storage Systems
Abstract-- Shared temporary storage space is often the constraining resource for clusters that serve as execution nodes in wide-area distributed systems. At least one large nationa...
Douglas Thain
ASM
2008
ASM
13 years 6 months ago
Formal Modeling and Analysis of a Flash Filesystem in Alloy
This paper describes the formal modeling and analysis of a design for a flash-based filesystem in Alloy. We model the basic operations of a filesystem as well as features that are ...
Eunsuk Kang, Daniel Jackson
EUC
2006
Springer
13 years 8 months ago
Write Back Routine for JFFS2 Efficient I/O
Abstract. When flash memory is used as a storage in embedded systems, block level translation layer is required between conventional filesystem and flash memory chips due to its ph...
Seung Ho Lim, Sung Hoon Baek, Joo Young Hwang, Kyu...