Sciweavers

121
Voted
DSN
2004
IEEE
15 years 7 months ago
Efficient Byzantine-Tolerant Erasure-Coded Storage
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol...
Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger,...
CCS
2006
ACM
15 years 7 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
CCS
2006
ACM
15 years 7 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...
77
Voted
DSN
2004
IEEE
15 years 7 months ago
An Adaptive Algorithm for Efficient Message Diffusion in Unreliable Environments
Benoît Garbinato, Fernando Pedone, Rodrigo S...
98
Voted
CCS
2006
ACM
15 years 7 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari