A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
Previous research has addressed the scalability and availability issues associated with the construction of cluster-based network services. This paper studies the clustering of re...
Kai Shen, Tao Yang, Lingkun Chu, JoAnne Holliday, ...
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...