Sciweavers

1453 search results - page 192 / 291
» State and history in operating systems
Sort
View
72
Voted
NSDI
2007
15 years 3 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
102
Voted
FAST
2007
15 years 2 months ago
Strong Accountability for Network Storage
This paper presents the design, implementation, and evaluation of CATS, a network storage service with strong accountability properties. A CATS server annotates read and write res...
Aydan R. Yumerefendi, Jeffrey S. Chase
83
Voted
USENIX
2001
15 years 2 months ago
Design and Implementation of the X Rendering Extension
The 2000 Usenix Technical Conference included a presentation outlining the state of the X rendering environment and the capabilities necessary to bring X into the modern world. Du...
Keith Packard
100
Voted
MSOM
2007
105views more  MSOM 2007»
15 years 4 days ago
Managing a Bank's Currency Inventory Under New Federal Reserve Guidelines
New currency recirculation guidelines implemented by the Federal Reserve System (Fed) of the United States are intended to reduce the overuse of its currency processing services b...
H. Neil Geismar, Milind Dawande, Divakar Rajamani,...
ACSAC
2010
IEEE
14 years 10 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...