Sciweavers

878 search results - page 97 / 176
» A Compiler-Based Approach to Data Security
Sort
View
109
Voted
SIGOPS
2008
116views more  SIGOPS 2008»
15 years 3 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
153
Voted
TDSC
2010
160views more  TDSC 2010»
14 years 10 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 10 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
100
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Enabling Hierarchical and Bulk-Distribution for Watermarked Content
One of the solutions to deter copyright violations consists of embedding hard to detect watermarks in digital media. Current developments have focused on how to embed watermarks, ...
Germano Caronni, Christoph L. Schuba
123
Voted
SOSP
2007
ACM
16 years 12 days ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...