Documents Related by Co-Citation

23 WebFS: a global cache coherent filesystem – Amin Vahdat, Paul Eastham, Thomas Anderson - 1996
814 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
442 Design and Implementation or the Sun Network Filesystem – Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, Bob Lyon - 1985
53 Protection and communication abstractions for Web browsers in MashupOS – H J Wang, X Fan, J Howell, C Jackson - 2007
344 Dynamo: amazon’s highly available key-value store – Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, Werner Vogels - 2007
40 Towards Trusted Cloud Computing – Nuno Santos, Krishna P. Gummadi, Rodrigo Rodrigues - 2009
84 get off my cloud: exploring information leakage in third party compute clouds – you Hey - 2009
771 Tor: The Second-Generation Onion Router – Roger Dingledine, Nick Mathewson, Paul Syverson - 2004
167 DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language – Yuan Yu, Michael Isard, Dennis Fetterly, Mihai Budiu, Úlfar Erlingsson, Pradeep Kumar, Gunda Jon Currey
7 Security and protection in the IBM System/38 – V Berstis - 1980
16 Delegation of cryptographic servers for capture-resilient devices – Philip Mackenzie - 2001
23 A revocable backup system – D Boneh, R Lipton - 1996
3 for Applied Network Research. The Squid Internet Object Cache. http://squid. – N L
9 Induced churn as shelter from routing table poisoning – T Condie, V Kacholia, S Sankararaman, J M Hellerstein, P Maniatis - 2006
3 The Organization and Sharing of Web-Service Objects with Menagerie – Roxana Geambasu, Cherie Cheung, Er Moshchuk, Steven D. Gribble, Henry M. Levy - 2007
6 Securing Structured Overlays Against Identity Attacks – Krishna P. N. Puttaswamy, Ben Y. Zhao, Haitao Zheng
4 Tor researcher who exposed embassy e-mail passwords gets raided by – K Zetter - 2007
5 Exposure-resilience for free: The case of hierarchical ID-based encryption – Y Dodis, M Yung
10 Myrmic: Secure and robust DHT routing – Peng Wang, Ivan Osipkov, Yongdae Kim - 2007