-
2
-
-
78651331525
-
-
Stanford WebBase. http://diglib.stanford.edu:8091/~testbed/doc2/WebBase/.
-
-
-
-
3
-
-
52149087973
-
Logic in access control
-
M. Abadi. Logic in Access Control. In Proc. LICS, 2003.
-
(2003)
Proc. LICS
-
-
Abadi, M.1
-
4
-
-
77954646007
-
BOOM analytics: Exploring data-centric, declarative programming for the cloud
-
P. Alvaro, T. Condie, N. Conway, K. Elmeleegy, J. Hellerstein, and R. Sears. BOOM Analytics: Exploring Data-Centric, Declarative Programming for the Cloud. In Proc. EuroSys, 2010.
-
(2010)
Proc. EuroSys
-
-
Alvaro, P.1
Condie, T.2
Conway, N.3
Elmeleegy, K.4
Hellerstein, J.5
Sears, R.6
-
7
-
-
0002439387
-
Why and where: A characterization of data provenance
-
P. Buneman, S. Khanna, and W. C. Tan. Why and where: A characterization of data provenance. In Proc. ICDT, 2001.
-
(2001)
Proc. ICDT
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
8
-
-
84865360319
-
Cloud security is not (just) virtualization security
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni. Cloud Security is not (just) Virtualization Security. In Proc. CCSW, 2009.
-
(2009)
Proc. CCSW
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
10
-
-
85030321143
-
Mapreduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In Proc. OSDI, 2004.
-
(2004)
Proc. OSDI
-
-
Dean, J.1
Ghemawat, S.2
-
11
-
-
84867167943
-
Binder: A logic-based security language
-
J. DeTreville. Binder: A logic-based security language. In Proc IEEE S&P, 2002.
-
(2002)
Proc IEEE S&P
-
-
De Treville, J.1
-
12
-
-
78651282483
-
-
*. http://www.joindiaspora.com.
-
*
-
-
-
14
-
-
85048840252
-
Dynamic authenticated index structures for outsourced databases
-
M. H. Feifei Li and G. Kollios. Dynamic authenticated index structures for outsourced databases. In Proc. SIGMOD, 2006.
-
(2006)
Proc. SIGMOD
-
-
Feifei Li, M.H.1
Kollios, G.2
-
17
-
-
35448945287
-
ORCHESTRA: Facilitating collaborative data sharing
-
T. J. Green, G. Karvounarakis, N. E. Taylor, O. Biton, Z. G. Ives, and V. Tannen. ORCHESTRA: Facilitating Collaborative Data Sharing. In Proc. SIGMOD, 2007.
-
(2007)
Proc. SIGMOD
-
-
Green, T.J.1
Karvounarakis, G.2
Taylor, N.E.3
Biton, O.4
Ives, Z.G.5
Tannen, V.6
-
18
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical Accountability for Distributed Systems. In Proc. SOSP, 2007.
-
(2007)
Proc. SOSP
-
-
Haeberlen, A.1
Kuznetsov, P.2
Druschel, P.3
-
19
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proc. FAST, 2009.
-
(2009)
Proc. FAST
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
20
-
-
84888527471
-
Querying the internet with PIER
-
R. Huebsch, J. M. Hellerstein, N. Lanham, B. T. Loo, S. Shenker, and I. Stoica. Querying the Internet with PIER. In Proc. VLDB, 2003.
-
(2003)
Proc. VLDB
-
-
Huebsch, R.1
Hellerstein, J.M.2
Lanham, N.3
Loo, B.T.4
Shenker, S.5
Stoica, I.6
-
21
-
-
33749662509
-
Orchestra: Rapid, collaborative sharing of dynamic data
-
Z. Ives, N. Khandelwal, A. Kapur, and M. Cakir. Orchestra: Rapid, collaborative sharing of dynamic data. In Proc. CIDR, 2005.
-
(2005)
Proc. CIDR
-
-
Ives, Z.1
Khandelwal, N.2
Kapur, A.3
Cakir, M.4
-
25
-
-
67649647582
-
Recursive computation of regions and connectivity in networks
-
M. Liu, N. Taylor, W. Zhou, Z. Ives, and B. T. Loo. Recursive computation of regions and connectivity in networks. In Proc. ICDE, 2009.
-
(2009)
Proc. ICDE
-
-
Liu, M.1
Taylor, N.2
Zhou, W.3
Ives, Z.4
Loo, B.T.5
-
26
-
-
84885583527
-
Implementing declarative overlays
-
B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica. Implementing Declarative Overlays. In Proc. SOSP, 2005.
-
(2005)
Proc. SOSP
-
-
Loo, B.T.1
Condie, T.2
Hellerstein, J.M.3
Maniatis, P.4
Roscoe, T.5
Stoica, I.6
-
28
-
-
77954743755
-
SecureBlox: Customizable secure distributed data processing
-
W. R. Marczak, S. S. Huang, M. Bravenboer, M. Sherr, B. T. Loo, and M. Aref. SecureBlox: Customizable Secure Distributed Data Processing. In Proc. SIGMOD, 2010.
-
(2010)
Proc. SIGMOD
-
-
Marczak, W.R.1
Huang, S.S.2
Bravenboer, M.3
Sherr, M.4
Loo, B.T.5
Aref, M.6
-
29
-
-
84889706925
-
Declarative reconfigurable trust management
-
W. R. Marczak, D. Zook, W. Zhou, M. Aref, and B. T. Loo. Declarative reconfigurable trust management. In Proc. CIDR, 2009.
-
(2009)
Proc. CIDR
-
-
Marczak, W.R.1
Zook, D.2
Zhou, W.3
Aref, M.4
Loo, B.T.5
-
31
-
-
58149462240
-
Partially materialized digest scheme: An efficient verification method for outsourced databases
-
K. Mouratidis, D. Sacharidis, and H. Pang. Partially materialized digest scheme: an efficient verification method for outsourced databases. VLDB Journal, 2009.
-
(2009)
VLDB Journal
-
-
Mouratidis, K.1
Sacharidis, D.2
Pang, H.3
-
32
-
-
78651304472
-
Declarative toolkit for rapid network protocol simulation and experimentation
-
S. C. Muthukumar, X. Li, C. Liu, J. B. Kopena, M. Oprea, and B. T. Loo. Declarative toolkit for rapid network protocol simulation and experimentation. In SIGCOMM (demo), 2009.
-
(2009)
SIGCOMM (demo)
-
-
Muthukumar, S.C.1
Li, X.2
Liu, C.3
Kopena, J.B.4
Oprea, M.5
Loo, B.T.6
-
33
-
-
24944520998
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In Proc. NDSS, 2004.
-
(2004)
Proc. NDSS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
34
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. The Eucalyptus Open-Source Cloud-Computing System. In Proc. CCGRID, 2009.
-
(2009)
Proc. CCGRID
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
35
-
-
40049111546
-
Verifying completeness of relational query answers from online servers
-
H. Pang and K.-L. Tan. Verifying Completeness of Relational Query Answers from Online Servers. ACM TISSEC, 2008.
-
(2008)
ACM TISSEC
-
-
Pang, H.1
Tan, K.-L.2
-
39
-
-
85180538667
-
A3: An extensible platform for application-aware anonymity
-
M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. T. Loo, and M. Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In Proc. NDSS, 2010.
-
(2010)
Proc. NDSS
-
-
Sherr, M.1
Mao, A.2
Marczak, W.R.3
Zhou, W.4
Loo, B.T.5
Blaze, M.6
-
40
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In Proc. SIGCOMM, 2001.
-
(2001)
Proc. SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
41
-
-
78449235064
-
Managing security of virtual machine images in a cloud environment
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning. Managing Security of Virtual Machine Images in a Cloud Environment. In Proc. CCSW, 2009.
-
(2009)
Proc. CCSW
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
42
-
-
67649635248
-
Unified declarative platform for secure networked information systems
-
W. Zhou, Y. Mao, B. T. Loo, and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In Proc. ICDE, 2009.
-
(2009)
Proc. ICDE
-
-
Zhou, W.1
Mao, Y.2
Loo, B.T.3
Abadi, M.4
-
43
-
-
77954746819
-
Efficient querying and maintenance of network provenance at internet-scale
-
W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at internet-scale. In Proc. SIGMOD, 2010.
-
(2010)
Proc. SIGMOD
-
-
Zhou, W.1
Sherr, M.2
Tao, T.3
Li, X.4
Loo, B.T.5
Mao, Y.6
-
44
-
-
78651268739
-
From facebook, answering privacy concerns with new settings
-
24 May
-
M. Zuckerberg. From Facebook, Answering Privacy Concerns with New Settings. The Washington Post, 24 May 2010.
-
(2010)
The Washington Post
-
-
Zuckerberg, M.1
|