-
1
-
-
84880163487
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "Maui: making smartphones last longer with code offload," in Mobisys '10. ACM
-
Mobisys'10. ACM
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
2
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, "Clonecloud: elastic execution between mobile device and cloud," in Eurosys '11
-
Eurosys'11
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
3
-
-
84879746008
-
Comet: Code offload by migrating execution transparently
-
M. S. Gordon, D. A. Jamshidi, S. A. Mahlke, Z. M. Mao, and X. Chen, "Comet: Code offload by migrating execution transparently." in OSDI '12
-
OSDI '12
-
-
Gordon, M.S.1
Jamshidi, D.A.2
Mahlke, S.A.3
Mao, Z.M.4
Chen, X.5
-
4
-
-
84958576457
-
Demo:: Nomad: An edge cloud platform for hyper-responsive mobile apps
-
Applications, and Services, ser. MobiSys '15. New York, NY, USA: ACM
-
A. Pamboris, M. Baguena, A. L. Wolf, P. Manzoni, and P. Pietzuch, "Demo:: Nomad: An edge cloud platform for hyper-responsive mobile apps," in Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '15. New York, NY, USA: ACM, 2015, pp. 459-459. [Online]. Available: http://doi.acm.org/10.1145/2742647.2745928
-
(2015)
Proceedings of the 13th Annual International Conference on Mobile Systems
, pp. 459
-
-
Pamboris, A.1
Baguena, M.2
Wolf, A.L.3
Manzoni, P.4
Pietzuch, P.5
-
5
-
-
85010812234
-
Appflux: Taming mobile app delivery via streaming
-
Monterey, CA, USA: USENIX Association
-
K. Bhardwaj, P. Agarwal, A. Gavrilovska, K. Schwan, and A. Allred, "Appflux: Taming mobile app delivery via streaming," in TRIOS '15. Monterey, CA, USA: USENIX Association
-
TRIOS '15
-
-
Bhardwaj, K.1
Agarwal, P.2
Gavrilovska, A.3
Schwan, K.4
Allred, A.5
-
6
-
-
84903125253
-
Towards wearable cognitive assistance
-
Applications, and Services, ser. MobiSys '14. New York, NY, USA: ACM
-
K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan, "Towards wearable cognitive assistance," in Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '14. New York, NY, USA: ACM, 2014, pp. 68-81. [Online]. Available: http://doi.acm.org/10.1145/2594368.2594383
-
(2014)
Proceedings of the 12th Annual International Conference on Mobile Systems
, pp. 68-81
-
-
Ha, K.1
Chen, Z.2
Hu, W.3
Richter, W.4
Pillai, P.5
Satyanarayanan, M.6
-
8
-
-
84881167819
-
Just-in-time provisioning for cyber foraging
-
Applications, and Services, ser. MobiSys '13. New York, NY, USA: ACM
-
K. Ha, P. Pillai, W. Richter, Y. Abe, and M. Satyanarayanan, "Just-in-time provisioning for cyber foraging," in Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '13. New York, NY, USA: ACM, 2013, pp. 153-166. [Online]. Available: http://doi.acm.org/10.1145/2462456.2464451
-
(2013)
Proceeding of the 11th Annual International Conference on Mobile Systems
, pp. 153-166
-
-
Ha, K.1
Pillai, P.2
Richter, W.3
Abe, Y.4
Satyanarayanan, M.5
-
9
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
OSDI'14. Berkeley, CA, USA: USENIX Association
-
A. Baumann, M. Peinado, and G. Hunt, "Shielding applications from an untrusted cloud with haven," in Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI'14. Berkeley, CA, USA: USENIX Association, 2014, pp. 267-283. [Online]. Available: http://dl.acm.org/citation.cfmid=2685048.2685070
-
(2014)
Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, ser
, pp. 267-283
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
10
-
-
84945211833
-
-
Tech. Rep. MSR-TR-2014-39 February
-
F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich, "Vc3: Trustworthy data analytics in the cloud," Tech. Rep. MSR-TR-2014-39, February 2014. [Online]. Available: http://research.microsoft. com/apps/pubs/default.aspxid=210786
-
(2014)
Vc3: Trustworthy Data Analytics in the Cloud
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
11
-
-
85180759573
-
OpenSGX: An open platform for SGX research
-
San Diego, CA Feb
-
P. Jain, S. Desai, S. Kim, M.-W. Shih, J. Lee, C. Choi, Y. Shin, T. Kim, B. B. Kang, and D. Han, "OpenSGX: An Open Platform for SGX Research," in Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2016
-
(2016)
Proceedings of the Network and Distributed System Security Symposium
-
-
Jain, P.1
Desai, S.2
Kim, S.3
Shih, M.-W.4
Lee, J.5
Choi, C.6
Shin, Y.7
Kim, T.8
Kang, B.B.9
Han, D.10
-
12
-
-
84893423195
-
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. Rozas, H. Shafi, V. Shanbhogue, and U. Savagaonkar, "Innovative instructions and software model for isolated execution," https: //goo.gl/6mp7ww
-
Innovative Instructions and Software Model for Isolated Execution
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.7
-
14
-
-
85010773709
-
Missive: Fast application launch from an untrusted buffer cache
-
USENIX ATC'14. Berkeley, CA, USA: USENIX Association 2014
-
J. Howell, J. Elson, B. Parno, and J. R. Douceur, "Missive: Fast application launch from an untrusted buffer cache," in Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, ser. USENIX ATC'14. Berkeley, CA, USA: USENIX Association, 2014, pp. 145-156. [Online]. Available: http: //dl.acm.org/citation.cfmid=2643634.2643650
-
Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, ser
, pp. 145-156
-
-
Howell, J.1
Elson, J.2
Parno, B.3
Douceur, J.R.4
-
16
-
-
37849054252
-
Quantifying the performance isolation properties of virtualization systems
-
New York, NY, USA: ACM
-
J. N. Matthews, W. Hu, M. Hapuarachchi, T. Deshane, D. Dimatos, G. Hamilton, M. McCabe, and J. Owens, "Quantifying the performance isolation properties of virtualization systems," in Proceedings of the 2007 Workshop on Experimental Computer Science, ser. ExpCS '07. New York, NY, USA: ACM, 2007. [Online]. Available: http://doi.acm.org/10.1145/1281700.1281706
-
(2007)
Proceedings of the 2007 Workshop on Experimental Computer Science, Ser. ExpCS '07
-
-
Matthews, J.N.1
Hu, W.2
Hapuarachchi, M.3
Deshane, T.4
Dimatos, D.5
Hamilton, G.6
McCabe, M.7
Owens, J.8
-
17
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
3 Park Avenue, 17th Floor, New York, NY 10016
-
B. Yee, D. Sehr, G. Dardyk, B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, "Native client: A sandbox for portable, untrusted x86 native code," in IEEE Symposium on Security and Privacy (Oakland'09), IEEE, 3 Park Avenue, 17th Floor, New York, NY 10016, 2009. [Online]. Available: http://nativeclient.googlecode.com/svn/data/docs tarball/nacl/ googleclient/native client/documentation/nacl paper.pdf
-
(2009)
IEEE Symposium on Security and Privacy (Oakland'09), IEEE
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
18
-
-
84967225498
-
Jitsu: Just-in-time summoning of unikernels
-
Oakland, CA: USENIX Association May
-
A. Madhavapeddy, T. Leonard, M. Skjegstad, T. Gazagnaire, D. Sheets, D. Scott, R. Mortier, A. Chaudhry, B. Singh, J. Ludlam, J. Crowcroft, and I. Leslie, "Jitsu: Just-in-time summoning of unikernels," in 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). Oakland, CA: USENIX Association, May 2015, pp. 559-573. [Online]. Available: https://www.usenix.org/conference/ nsdi15/technical-sessions/presentation/madhavapeddy
-
(2015)
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)
, pp. 559-573
-
-
Madhavapeddy, A.1
Leonard, T.2
Skjegstad, M.3
Gazagnaire, T.4
Sheets, D.5
Scott, D.6
Mortier, R.7
Chaudhry, A.8
Singh, B.9
Ludlam, J.10
Crowcroft, J.11
Leslie, I.12
-
19
-
-
85010789510
-
-
Docker
-
Docker. https://www.docker.com/.
-
-
-
-
20
-
-
85076709246
-
Embassies: Radically refactoring the web
-
Berkeley, CA, USA: USENIX Association
-
J. Howell, B. Parno, and J. R. Douceur, "Embassies: Radically refactoring the web," in Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, ser. nsdi'13. Berkeley, CA, USA: USENIX Association, 2013, pp. 529-546. [Online]. Available: http: //dl.acm.org/citation.cfm'id=2482626.2482676
-
(2013)
Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, Ser. Nsdi'13
, pp. 529-546
-
-
Howell, J.1
Parno, B.2
Douceur, J.R.3
-
22
-
-
84933678125
-
How to run posix apps in a minimal picoprocess
-
Berkeley, CA, USA: USENIX Association
-
J. Howell, B. Parno, and J. R. Douceur, "How to run posix apps in a minimal picoprocess," in Proceedings of the 2013 USENIX Conference on Annual Technical Conference, ser. USENIX ATC'13. Berkeley, CA, USA: USENIX Association, 2013, pp. 321-332. [Online]. Available: http: //dl.acm.org/citation.cfm?id=2535461.2535500
-
Proceedings of the 2013 USENIX Conference on Annual Technical Conference, Ser. USENIX ATC13
, vol.2013
, pp. 321-332
-
-
Howell, J.1
Parno, B.2
Douceur, J.R.3
-
23
-
-
85076904874
-
Leveraging legacy code to deploy desktop applications on the web
-
Berkeley, CA, USA: USENIX Association
-
J. R. Douceur, J. Elson, J. Howell, and J. R. Lorch, "Leveraging legacy code to deploy desktop applications on the web," in Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI?08. Berkeley, CA, USA: USENIX Association, 2008, pp. 339-354. [Online]. Available: http://dl.acm.org/citation. cfm?id=1855741.1855765
-
(2008)
Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI'08
, pp. 339-354
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
24
-
-
85010745499
-
-
Aufs-layered filesystem @ http://goo.gl/z5l9fc
-
"Aufs-layered filesystem @ http://goo.gl/z5l9fc." [Online]. Available: http://goo.gl/Z5l9FC
-
-
-
-
25
-
-
84875649201
-
Iago attacks: Why the system call api is a bad untrusted rpc interface
-
New York, NY, USA: ACM
-
S. Checkoway and H. Shacham, "Iago attacks: Why the system call api is a bad untrusted rpc interface," in Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ser. ASPLOS-13. New York, NY, USA: ACM, 2013, pp. 253-264. [Online]. Available: http://doi.acm.org/10.1145/2451116.2451145
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, Ser. ASPLOS-13
, pp. 253-264
-
-
Checkoway, S.1
Shacham, H.2
-
26
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
Washington, DC, USA: IEEE Computer Society
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig, "Trustvisor: Efficient tcb reduction and attestation," in Proceedings of the 2010 IEEE Symposium on Security and Privacy, ser. SP-10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 143-158. [Online]. Available: http://dx.doi.org/10.1109/SP.2010.17
-
(2010)
Proceedings of The, 2010, IEEE Symposium on Security and Privacy, Ser. SP-10
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
27
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
New York, NY, USA: ACM
-
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel, "Inktag: Secure applications on an untrusted operating system," in Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ser. ASPLOS-13. New York, NY, USA: ACM, 2013, pp. 265-278. [Online]. Available: http://doi.acm.org/10.1145/ 2451116.2451146
-
(2013)
Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, Ser. ASPLOS-13
, pp. 265-278
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
28
-
-
57349173947
-
Trustworthy and personalized computing on public kiosks
-
New York, NY, USA: ACM
-
S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Trustworthy and personalized computing on public kiosks," in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys-08. New York, NY, USA: ACM, 2008, pp. 199-210. [Online]. Available: http: //doi.acm.org/10.1145/1378600.1378623
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys-08
, pp. 199-210
-
-
Garriss, S.1
Caceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
29
-
-
33845653247
-
Slingshot: Deploying stateful services in wireless hotspots
-
New York, NY, USA: ACM
-
Y.-Y. Su and J. Flinn, "Slingshot: Deploying stateful services in wireless hotspots," in Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, ser. MobiSys-05. New York, NY, USA: ACM, 2005, pp. 79-92. [Online]. Available: http://doi.acm.org/10.1145/ 1067170.1067180
-
(2005)
Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys-05
, pp. 79-92
-
-
Su, Y.-Y.1
Flinn, J.2
-
30
-
-
21644486892
-
A lightweight secure cyber foraging infrastructure for resource-constrained devices
-
Washington, DC, USA: IEEE Computer Society
-
S. Goyal and J. Carter, "A lightweight secure cyber foraging infrastructure for resource-constrained devices," in Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications, ser. WMCSA-04. Washington, DC, USA: IEEE Computer Society, 2004, pp. 186-195. [Online]. Available: http://dx.doi.org/10.1109/ MCSA.2004.2
-
(2004)
Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications, Ser. WMCSA-04
, pp. 186-195
-
-
Goyal, S.1
Carter, J.2
-
31
-
-
85010745039
-
-
Docker trusted registry service
-
Docker trusted registry service. https://goo.gl/lTZWhM.
-
-
-
-
32
-
-
84962273039
-
Blindbox: Deep packet inspection over encrypted traffic
-
New York, NY, USA: ACM
-
J. Sherry, C. Lan, R. A. Popa, and S. Ratnasamy, "Blindbox: Deep packet inspection over encrypted traffic," in Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, ser. SIGCOMM-15. New York, NY, USA: ACM, 2015, pp. 213-226. [Online]. Available: http://doi.acm.org/10.1145/2785956.2787502
-
(2015)
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, Ser. SIGCOMM-15
, pp. 213-226
-
-
Sherry, J.1
Lan, C.2
Popa, R.A.3
Ratnasamy, S.4
-
33
-
-
84962271239
-
Multi-context tls (mctls): Enabling secure in-network functionality in tls
-
New York, NY, USA: ACM
-
D. Naylor, K. Schomp, M. Varvello, I. Leontiadis, J. Blackburn, D. R. Lopez, K. Papagiannaki, P. Rodriguez Rodriguez, and P. Steenkiste, "Multi-context tls (mctls): Enabling secure in-network functionality in tls," in Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, ser. SIGCOMM-15. New York, NY, USA: ACM, 2015, pp. 199-212. [Online]. Available: http://doi.acm.org/10.1145/2785956.2787482
-
(2015)
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, Ser. SIGCOMM-15
, pp. 199-212
-
-
Naylor, D.1
Schomp, K.2
Varvello, M.3
Leontiadis, I.4
Blackburn, J.5
Lopez, D.R.6
Papagiannaki, K.7
Rodriguez Rodriguez, P.8
Steenkiste, P.9
-
35
-
-
85010812259
-
Appflux: Taming mobile app delivery via app streaming
-
K. Bhardwaj, P. Agarwal, A. Gavrilovska, K. Schwan, and A. Allred, "Appflux: Taming mobile app delivery via app streaming," in TRIOS 15
-
TRIOS 15
-
-
Bhardwaj, K.1
Agarwal, P.2
Gavrilovska, A.3
Schwan, K.4
Allred, A.5
-
36
-
-
84903125253
-
Towards wearable cognitive assistance
-
K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan, "Towards wearable cognitive assistance," in Mobisys-14
-
Mobisys-14
-
-
Ha, K.1
Chen, Z.2
Hu, W.3
Richter, W.4
Pillai, P.5
Satyanarayanan, M.6
-
44
-
-
84907313371
-
Paradrop: A multi-tenant platform for dynamically installed third party services on home gateways
-
New York, NY, USA: ACM
-
D. F. Willis, A. Dasgupta, and S. Banerjee, "Paradrop: A multi-tenant platform for dynamically installed third party services on home gateways," in Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, ser. DCC-14. New York, NY, USA: ACM, 2014, pp. 43-44. [Online]. Available: http: //doi.acm.org/10.1145/2627566.2627583
-
(2014)
Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Ser. DCC-14
, pp. 43-44
-
-
Willis, D.F.1
Dasgupta, A.2
Banerjee, S.3
-
47
-
-
84883726912
-
Security and privacy in mobile cloud computing
-
H. Suo, Z. Liu, J. Wan, and K. Zhou, "Security and privacy in mobile cloud computing," in Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International. IEEE, 2013, pp. 655-659
-
(2013)
Wireless Communications and Mobile Computing Conference (IWCMC) 2013 9th International. IEEE
, pp. 655-659
-
-
Suo, H.1
Liu, Z.2
Wan, J.3
Zhou, K.4
|