Sciweavers

23 search results - page 2 / 5
» osdi 2000
Sort
View
91
Voted
OSDI
2000
ACM
14 years 11 months ago
Scalable, Distributed Data Structures for Internet Service Construction
Steven D. Gribble, Eric A. Brewer, Joseph M. Helle...
62
Voted
OSDI
2000
ACM
14 years 11 months ago
Self-Securing Storage: Protecting Data in Compromised Systems
John D. Strunk, Garth R. Goodson, Michael L. Schei...
84
Voted
OSDI
2000
ACM
14 years 11 months ago
Proactive Recovery in a Byzantine-Fault-Tolerant System
This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors. Our system is t...
Miguel Castro, Barbara Liskov
98
Voted
OSDI
2000
ACM
14 years 11 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
OSDI
2000
ACM
14 years 11 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro