Kerberos: An authentication service for open network systems
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In USENIX 1988, Feb. 1988.
Reviews due Tuesday, 11/4.
« September 2014 | Main | November 2014 »
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In USENIX 1988, Feb. 1988.
Reviews due Tuesday, 11/4.
Interposed Request Routing for Scalable Network Storage by Darrell Anderson, Jeff Chase, and Amin Vahdat. In the Fourth Symposium on Operating System Design and Implementation (OSDI2000).
Reviews due Thursday, 10/30.
David Mazieres, Michael Kaminsky, M. Frans Kaashoek, and Emmett Witchel.< a href="http://dl.acm.org/citation.cfm?doid=319151.319160">Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles, pages 124--139, Kiawa Island, SC, 1999. ACM.
Reviews due Tuesday, 10/28.
Chandramohan Thekkath, Timothy Mann, and Edward Lee. Frangipani: A Scalable Distributed File System. Proc. of the 16th ACM Symposium on Operating Systems Principles, October 1997, pages 224-237.
Review due Thursday 10/23
E. K. Lee and C. A. Thekkath. Petal: Distributed virtual disks. In Proc. 7th Int. Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS) , pages 84--92, October 1996.
Review due Thursday 10/23
Practical Byzantine Fault Tolerance;Miguel Castro and Barbara Liskov,OSDI'99
Review this or Byzantine Generals Problem for Tuesday, October 14th.
Do not write about applicability of the system
Do write 1 (or more) thing you found confusing about the paper or did not understand, and 1 thing you learned from the paper.
Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, July 1982, pages 382-401.
Review due for this or practical byzantine fault tolerance due Tuesday, October 14th.
Do not write about applicability of the system
Do write 1 (or more) thing you found confusing about the paper or did not understand, and 1 thing you learned from the paper.
< a href="http://pages.cs.wisc.edu/~rist/papers/cloudsec.html">Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of Computer and Communications Security -- CCS '09.
Reviews due Tuesday, 10/7.
M. Chandy and L. Lamport. Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst., 3(1):63-75, 1985.
Review due Thursdsay, 10/2.