Sciweavers

172
Voted
SIGOPSE
2004
ACM
15 years 7 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
SIGOPSE
2004
ACM
15 years 7 months ago
Separating durability and availability in self-managed storage
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
Geoffrey Lefebvre, Michael J. Feeley
SIGOPSE
2004
ACM
15 years 7 months ago
Scalable strong consistency for web applications
Web application workloads are often characterized by a large number of unique read requests and a significant fraction of write requests. Hosting these applications drives the ne...
Swaminathan Sivasubramanian, Guillaume Pierre, Maa...
SIGOPSE
2004
ACM
15 years 7 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
SIGOPSE
2004
ACM
15 years 7 months ago
Defending against eclipse attacks on overlay networks
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
Atul Singh, Miguel Castro, Peter Druschel, Antony ...
Operating System
Top of PageReset Settings