Sciweavers

1402 search results - page 55 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
128
Voted
ASPLOS
2011
ACM
14 years 7 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
159
Voted
VECPAR
2004
Springer
15 years 8 months ago
Data Management in Large-Scale P2P Systems
Peer-to-peer (P2P) computing offers new opportunities for building highly distributed data systems. Unlike client-server computing, P2P can operate without central coordination and...
Patrick Valduriez, Esther Pacitti
COLCOM
2005
IEEE
15 years 9 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
118
Voted
USENIX
2000
15 years 4 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
123
Voted
PTS
1998
81views Hardware» more  PTS 1998»
15 years 4 months ago
Testing Temporal Logic Properties in Distributed Systems
Based on the notion of event-based behavioral abstraction EBBA we specify properties of object-oriented distributed systems in linear time temporal logic. These properties are the...
Falk Dietrich, Xavier Logean, Shawn Koppenhoefer, ...