Sciweavers

1234 search results - page 77 / 247
» Privacy-preserving Virtual Machine
Sort
View
199
Voted
REPLICATION
2010
15 years 2 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman
150
Voted
SOSP
2003
ACM
16 years 18 days ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
160
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
OSDI
2002
ACM
16 years 4 months ago
Memory Resource Management in VMware ESX Server
VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper i...
Carl A. Waldspurger
ECBS
2007
IEEE
86views Hardware» more  ECBS 2007»
15 years 10 months ago
A Partitioning Analysis of the .NET Common Language Runtime
Microsoft's .NET platform was developed to simplify development of Windows applications. At the core of the .Net platform is a virtual machine known as the Common Language Ru...
Joshua R. Dick, Kenneth B. Kent, Joseph C. Libby