This poster paper presents a work in progress in the new emerging area of electronic services (e-services). The networked home with refrigerators and washing machines connected to...
Abstract. Naor and Pinkas introduced metering schemes at Eurocrypt ’98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to cons...
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
Although simulation is one of the most innovative and cost-effective tools for modeling and analyzing a system, simulation studies often fail to provide any useful results. One re...
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...