Sciweavers

5 search results - page 1 / 1
» Reflective Authorization Systems
Sort
View
OSDI
2000
ACM
15 years 5 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
OSDI
2008
ACM
16 years 4 months ago
Digging for Data Structures
Because writing computer programs is hard, computer programmers are taught to use encapsulation and modularity to hide complexity and reduce the potential for errors. Their progra...
Anthony Cozzie, Frank Stratton, Hui Xue, Samuel T....
OSDI
2008
ACM
16 years 4 months ago
Network Imprecision: A New Consistency Metric for Scalable Monitoring
This paper introduces a new consistency metric, Network Imprecision (NI), to address a central challenge in largescale monitoring systems: safeguarding correctness despite node an...
Navendu Jain, Prince Mahajan, Dmitry Kit, Praveen ...
119
Voted
OSDI
2002
ACM
16 years 4 months ago
Scale and Performance in the Denali Isolation Kernel
This paper describes the Denali isolation kernel, an operating system architecture that safely multiplexes a large number of untrusted Internet services on shared hardware. Denali...
Andrew Whitaker, Marianne Shaw, Steven D. Gribble
OSDI
1996
ACM
15 years 5 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee