Sciweavers

3031 search results - page 365 / 607
» SNMS - Shadow Network Management System
Sort
View
NDSS
2009
IEEE
15 years 11 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
POLICY
2009
Springer
15 years 11 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
DSN
2008
IEEE
15 years 11 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
NETGAMES
2005
ACM
15 years 10 months ago
Patch scheduling for on-line games
One of the challenges facing the on-line gaming community is the delivery of new content to players. While the initial distribution of a game is typically done via large media for...
Chris Chambers, Wu-chang Feng