Sciweavers

3299 search results - page 519 / 660
» Privacy and Trusted Computing
Sort
View
TLDI
2003
ACM
102views Formal Methods» more  TLDI 2003»
15 years 9 months ago
A typed interface for garbage collection
An important consideration for certified code systems is the interaction of the untrusted program with the runtime system, most notably the garbage collector. Most certified cod...
Joseph Vanderwaart, Karl Crary
CONCUR
2003
Springer
15 years 9 months ago
Contract Signing, Optimism, and Advantage
Abstract. A contract signing protocol lets two parties exchange digital signatures on a pre-agreed text. Optimistic contract signing protocols enable the signers to do so without i...
Rohit Chadha, John C. Mitchell, Andre Scedrov, Vit...
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
15 years 9 months ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
EUROSYS
2010
ACM
15 years 9 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
EUROSYS
2010
ACM
15 years 9 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry