172
Voted
SIGOPSE
15 years 7 months ago
2004 ACM
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
139
click to vote
SIGOPSE
15 years 7 months ago
2004 ACM
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the tra...
137
click to vote
SIGOPSE
15 years 7 months ago
2004 ACM
Web application workloads are often characterized by a large number of unique read requests and a significant fraction of write requests. Hosting these applications drives the ne...
131
click to vote
SIGOPSE
15 years 7 months ago
2004 ACM
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
130
click to vote
SIGOPSE
15 years 7 months ago
2004 ACM
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
|