-
2
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceeding of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, pages 1-14, 2002.
-
(2002)
Proceeding of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
4
-
-
85084162149
-
A general and flexible access-control system for the web
-
L. Bauer, M. A. Schneider, , and E. W. Felten. A general and flexible access-control system for the web. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, 2002.
-
Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, 2002
-
-
Bauer, L.1
Schneider, M.A.2
Felten, E.W.3
-
5
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
Proceedings of the 8th Information Security Conference, Singapore, Springer Verlag
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Proceedings of the 8th Information Security Conference, Singapore, pages 431-445. Springer Verlag LNCS 3650, 2005.
-
(2005)
LNCS
, vol.3650
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
6
-
-
27544508109
-
Distributed proving in access-control systems
-
L. Bauer, S. Garriss, and M. K. Reiter. Distributed proving in access-control systems. In Proceedings of 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pages 81-95, 2005.
-
(2005)
Proceedings of 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA
, pp. 81-95
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
7
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
M. Y. Becker, C. Fournet, and A. D. Gordon. Design and semantics of a decentralized authorization language. In Proceedings of 20th IEEE Computer Security Foundations Symposium, Venice, Italy, pages 3-16, 2007.
-
(2007)
Proceedings of 20th IEEE Computer Security Foundations Symposium, Venice, Italy
, pp. 3-16
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
8
-
-
0020118361
-
Grapevine: An exercise in distributed computing
-
A. D. Birrell, R. Levin, M. Schroeder, and R. Needham. Grapevine: an exercise in distributed computing. Communications of the ACM, 25(4):260-274, 1982.
-
(1982)
Communications of the ACM
, vol.25
, Issue.4
, pp. 260-274
-
-
Birrell, A.D.1
Levin, R.2
Schroeder, M.3
Needham, R.4
-
9
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pages 164-173, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada, pages 202-215, 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada
, pp. 202-215
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
11
-
-
0036083264
-
Binder, a logic-based security language
-
J. DeTreville. Binder, a logic-based security language. In Proceedings of 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pages 105-113, 2002.
-
(2002)
Proceedings of 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA
, pp. 105-113
-
-
DeTreville, J.1
-
12
-
-
85076769385
-
Persistent personal names for globally connected mobile devices
-
B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent personal names for globally connected mobile devices. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, USA, pages 233-248, 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, USA
, pp. 233-248
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
13
-
-
0034829512
-
SD3: A Trust Management System with Certificate Evaluation
-
T. Jim. SD3: a Trust Management System with Certificate Evaluation. In Proceedings of 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pages 106-115, 2001.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA
, pp. 106-115
-
-
Jim, T.1
-
14
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
15
-
-
77952364800
-
Alpaca: Extensible authorization for distributed services
-
C. Lesniewski-laas, B. Ford, J. Strauss, R. Morris, and M. F. Kaashoek. Alpaca: extensible authorization for distributed services. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, pages 432-444, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA
, pp. 432-444
-
-
Lesniewski-laas, C.1
Ford, B.2
Strauss, J.3
Morris, R.4
Kaashoek, M.F.5
-
16
-
-
70349088072
-
Effective and Efficient Compromise Recovery for Weakly Consistent Replication
-
P. Mahajan, R. Kotla, C. Marshall, V. Ramasubramanian, T. Rodeheffer, D. Terry, and T. Wobber. Effective and Efficient Compromise Recovery for Weakly Consistent Replication. In Proceedings of the Fourth EuroSys Conference, Nuremburg, Germany, pages 131-144, 2009.
-
(2009)
Proceedings of the Fourth EuroSys Conference, Nuremburg, Germany
, pp. 131-144
-
-
Mahajan, P.1
Kotla, R.2
Marshall, C.3
Ramasubramanian, V.4
Rodeheffer, T.5
Terry, D.6
Wobber, T.7
-
17
-
-
0042352260
-
Separating key management from file system security
-
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of 17th ACM Symposium on Operating Systems Principles, Kiawah Island Resort, SC, USA, pages 124-139, 1999.
-
(1999)
Proceedings of 17th ACM Symposium on Operating Systems Principles, Kiawah Island Resort, SC, USA
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
20
-
-
84870828684
-
-
Microsoft Corporation. Microsoft Sync Framework. http://code.msdn. microsoft.com/sync.
-
Microsoft Sync Framework
-
-
-
22
-
-
84978427421
-
Ivy: A read/write peer-to-peer file system
-
A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen. Ivy: A read/write peer-to-peer file system. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, pages 31-44, 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA
, pp. 31-44
-
-
Muthitacharoen, A.1
Morris, R.2
Gil, T.M.3
Chen, B.4
-
24
-
-
85076887479
-
Cimbiosys: A platform for content-based partial replication
-
V. Ramasubramanian, T. Rodeheffer, D. Terry, M. Walraed-Sullivan, T. Wobber, C. Marshall, and A. Vahdat. Cimbiosys: A platform for content-based partial replication. In Proceedings of 6th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, 2009.
-
Proceedings of 6th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, 2009
-
-
Ramasubramanian, V.1
Rodeheffer, T.2
Terry, D.3
Walraed-Sullivan, M.4
Wobber, T.5
Marshall, C.6
Vahdat, A.7
-
25
-
-
0001821002
-
Constraint databases: A survey
-
P. Z. Revesz. Constraint databases: a survey. Semantics and Databases, 1358:209-246, 1995.
-
(1995)
Semantics and Databases
, vol.1358
, pp. 209-246
-
-
Revesz, P.Z.1
-
26
-
-
0030080924
-
Maintaining replicated authorizations in distributed database systems
-
P. Samarati, P. Ammann, and S. Jajodia. Maintaining replicated authorizations in distributed database systems. Data and Knowledge Engineering, 1(18):55-84, 1996.
-
(1996)
Data and Knowledge Engineering
, vol.1
, Issue.18
, pp. 55-84
-
-
Samarati, P.1
Ammann, P.2
Jajodia, S.3
-
27
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
28
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
F. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 22(299), 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.299
-
-
Schneider, F.1
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 11(22):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.11
, Issue.22
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
33845192207
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
D. B. Terry,M. M. Theimer, K. Petersen, A. J. Demers, M. J. Spreitzer, and C. H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Copper Mountain Resort, CO,USA, pages 172-182, 1995.
-
(1995)
Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Copper Mountain Resort, CO,USA
, pp. 172-182
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.H.6
-
31
-
-
78651556127
-
Eventually consistent
-
W. Vogels. Eventually consistent. ACM Queue, 6(6):14-19, 2008.
-
(2008)
ACM Queue
, vol.6
, Issue.6
, pp. 14-19
-
-
Vogels, W.1
-
32
-
-
0028380781
-
Authentication in the Taos operating system
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|