Distributed file systems: Concepts and examples

E Levy, A Silberschatz - ACM Computing Surveys (CSUR), 1990 - dl.acm.org
The purpose of a distributed file system (DFS) is to allow users of physically distributed
computers to share data and storage resources by using a common file system. A typical …

The ideal versus the real: Revisiting the history of virtual machines and containers

A Randal - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
The common perception in both academic literature and industry today is that virtual
machines offer better security, whereas containers offer better performance. However, a …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

[图书][B] Handbook of research on modern cryptographic solutions for computer and cyber security

B Gupta, DP Agrawal, S Yamaguchi - 2016 - books.google.com
Internet usage has become a facet of everyday life, especially as more technological
advances have made it easier to connect to the web from virtually anywhere in the …

CHERI: A hybrid capability-system architecture for scalable software compartmentalization

RNM Watson, J Woodruff, PG Neumann… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating
system to support fine-grained, capability-based memory protection to mitigate memory …

The CHERI capability model: Revisiting RISC in an age of risk

J Woodruff, RNM Watson, D Chisnall… - ACM SIGARCH …, 2014 - dl.acm.org
Motivated by contemporary security challenges, we reevaluate and refine capability-based
addressing for the RISC era. We present CHERI, a hybrid capability model that extends the …

[HTML][HTML] A capability-based security approach to manage access control in the internet of things

S Gusmeroli, S Piccione, D Rotondi - Mathematical and Computer …, 2013 - Elsevier
Resource and information protection plays a relevant role in distributed systems like the
ones present in the Internet of Things (IoT). Authorization frameworks like RBAC and ABAC …

[HTML][HTML] Plutus: Scalable secure file sharing on untrusted storage

M Kallahalla, E Riedel, R Swaminathan… - … USENIX Conference on …, 2003 - usenix.org
Plutus is a cryptographic storage system that enables secure file sharing without placing
much trust on the file servers. In particular, it makes novel use of cryptographic primitives to …

LITE kernel RDMA support for datacenter applications

SY Tsai, Y Zhang - Proceedings of the 26th Symposium on Operating …, 2017 - dl.acm.org
Recently, there is an increasing interest in building data-center applications with RDMA
because of its low-latency, high-throughput, and low-CPU-utilization benefits. However …

Willow: A {User-Programmable}{SSD}

S Seshadri, M Gahagan, S Bhaskaran… - … USENIX Symposium on …, 2014 - usenix.org
We explore the potential of making programmability a central feature of the SSD interface.
Our prototype system, called Willow, allows programmers to augment and extend the …