149
click to vote
SIGOPSE
15 years 5 months ago
2004 ACM
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
115
click to vote
SIGOPSE
15 years 5 months ago
2004 ACM
Web application workloads are often characterized by a large number of unique read requests and a significant fraction of write requests. Hosting these applications drives the ne...
111
click to vote
SIGOPSE
15 years 5 months ago
2004 ACM
In this paper we take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATe...
107
click to vote
SIGOPSE
15 years 5 months ago
2004 ACM
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
103
click to vote
SIGOPSE
15 years 5 months ago
2004 ACM
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
|