Sciweavers

2335 search results - page 156 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ICALP
2003
Springer
15 years 10 months ago
Resource Access and Mobility Control with Dynamic Privileges Acquisition
µKlaim is a process language that permits programming distributed systems made up of several mobile components interacting through multiple distributed tuple spaces. We present th...
Daniele Gorla, Rosario Pugliese
126
Voted
ENTCS
2006
113views more  ENTCS 2006»
15 years 5 months ago
The Role of Back-Pressure in Implementing Latency-Insensitive Systems
Back-pressure is a logical mechanism to control the flow of information on a communication channel of a latency-insensitive system (LIS) while guaranteeing that no packet is lost....
Luca P. Carloni
EUROSYS
2010
ACM
15 years 10 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
CCS
2009
ACM
16 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CCS
2010
ACM
15 years 5 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov