Sciweavers

SRDS
2003
IEEE
13 years 9 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
SRDS
2003
IEEE
13 years 9 months ago
SNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
Yingwu Zhu, Yiming Hu
SRDS
2003
IEEE
13 years 9 months ago
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint
How will a virus propagate in a real network? Does an epidemic threshold exist for a finite powerlaw graph, or any finite graph? How long does it take to disinfect a network giv...
Yang Wang 0008, Deepayan Chakrabarti, Chenxi Wang,...
SRDS
2003
IEEE
13 years 9 months ago
Raptor: Integrating Checkpoints and Thread Migration for Cluster Management
distributed shared-memory (SDSM) provides the abstraction necessary to run shared-memory applications on cost-effective parallel platforms such as clusters of workstations. Howeve...
Hazim Shafi, Evan Speight, John K. Bennett
SRDS
2003
IEEE
13 years 9 months ago
Service Continuations: An Operating System Mechanism for Dynamic Migration of Internet Service Sessions
We propose service continuations (SC), an OS mechanism that supports seamless dynamic migration of Internet service sessions between cooperating multi-process servers. Service con...
Florin Sultan, Aniruddha Bohra, Liviu Iftode
SRDS
2003
IEEE
13 years 9 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
SRDS
2003
IEEE
13 years 9 months ago
Coordinated Forward Error Recovery for Composite Web Services
This paper proposes a solution based on forward error recovery, oriented towards providing dependability of composite Web services. While exploiting their possible support for fau...
Ferda Tartanoglu, Valérie Issarny, Alexande...
SRDS
2003
IEEE
13 years 9 months ago
A Reliable Key Authentication Schema for Secure Multicast Communications
Roberto Di Pietro, Antonio Durante, Luigi V. Manci...
SRDS
2003
IEEE
13 years 9 months ago
Preventing Orphan Requests in the Context of Replicated Invocation
In today’s systems, applications are composed from various components that may be located on different machines. The components (acting as servers) may have to collaborate in or...
Stefan Pleisch, Arnas Kupsys, André Schiper
SRDS
2003
IEEE
13 years 9 months ago
Appia vs. Cactus: Comparing Protocol Composition Frameworks
The paper presents and compares Appia and Cactus, two frameworks for protocol composition. The comparison is based on the experience gained in implementing a faulttolerant Atomic ...
Sergio Mena, Xavier Cuvellier, Christophe Gr&eacut...