• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 749
Next 10 →

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
are deleted, subsequently compromised nodes cannot decrypt old traffic. As a side benefit, onion replay detection is no longer necessary, and the process of building circuits is more reliable, since the initiator knows when a hop fails and can then try extending to a new node. Separation of "

Request

by unknown authors
"... Strategic Goal: The air in every American community will be safe and healthy to breathe. In particular, children, the elderly, and people with respiratory ailments will be protected from health risks of breathing polluted air. Reducing air pollution will also protect the environment, resulting in ma ..."
Abstract - Add to MetaCart
Strategic Goal: The air in every American community will be safe and healthy to breathe. In particular, children, the elderly, and people with respiratory ailments will be protected from health risks of breathing polluted air. Reducing air pollution will also protect the environment, resulting

Façade: An Experiment in Building a Fully-Realized Interactive Drama

by Michael Mateas, Andrew Stern , 2003
"... this paper we discuss our research and development towards creating an architecture, and a story design using this architecture, that integrates a broad and shallow approach to natural language processing, a novel character authoring language and a novel drama manager, in order to build an intera ..."
Abstract - Cited by 187 (17 self) - Add to MetaCart
gettogether at their apartment that quickly turns ugly, you become entangled in the high-conflict dissolution of Grace and Trips marriage. No one is safe as the accusations fly, sides are taken and irreversible decisions are forced to be made. By the end of this intense oneact play you

Enhancing Server Availability and Security Through Failure-Oblivious Computing

by Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, William S. Beebee - In Proceedings 6 th Symposium on Operating Systems Design and Implementation (OSDI , 2004
"... We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code simply ..."
Abstract - Cited by 180 (37 self) - Add to MetaCart
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code

The Safe-Tcl Security Model

by John K. Ousterhout, Jacob Y. Levy, Brent B. Welch , 1997
"... Safe-Tcl is a mechanism for controlling the execution of programs written in the Tcl scripting language. It allows untrusted scripts (applets) to be executed while preventing damage to the environment or leakage of private information. Safe-Tcl uses a padded cell approach: each applet is isolated in ..."
Abstract - Cited by 89 (0 self) - Add to MetaCart
in a safe interpreter where it cannot interact directly with the rest of the application. The execution environment of the safe interpreter is controlled by trusted scripts running in a master interpreter. Safe-Tcl provides an alias mechanism that allows applets to request services from the master

Memoir: Practical State Continuity for Protected Modules

by Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, Jonathan M. Mccune
"... Abstract—To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This requires more than just preserving state confidentiality and integrity, since, e.g., software may err if its state is rolled back to ..."
Abstract - Cited by 26 (7 self) - Add to MetaCart
to ensure rollback resistance without making the system vulnerable to system crashes. It does this by using a deterministic module, storing a concise summary of the module’s request history in protected NVRAM, and allowing only safe request replays after crashes. Since frequent NVRAM writes are impractical

Generative Design Rationale: Beyond the Record and Replay Paradigm

by Thomas R. Gruber, Daniel M. Russell - COMPUTER SCIENCE DEPARTMENT, STANFORD UNIVERSITY , 1993
"... Research in design rationale support must confront the fundamental questions of what kinds of design rationale information should be captured, and how rationales can be used to support engineering practice. This paper examines the kinds of information used in design rationale explanations, relating ..."
Abstract - Cited by 41 (2 self) - Add to MetaCart
them to the kinds of computational services that can be provided. Implications for the design of software tools for design rationale support are given. The analysis predicts that the "record and replay" paradigm of structured note-taking tools (electronic notebooks, deliberation notes

Partial Replay of Long-Running Applications

by Alvin Cheung, O Solar-lezama, Samuel Madden
"... Bugs in deployed software can be extremely difficult to track down. Invasive logging techniques, such as logging all nondeterministic inputs, can incur substantial runtime overheads. This paper shows how symbolic analysis can be used to re-create path equivalent executions for very long running prog ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
programs such as databases and web servers. The goal is to help developers debug such long-running programs by allowing them to walk through an execution of the last few requests or transactions leading up to an error. The challenge is to provide this functionality without the high runtime overheads

Consistent Synchronization Schemes for Workload Replay

by Konstantinos Morfonios, Romain Colle, Leonidas Galanis, Supiti Buranawatanachoke, Benoît Dageville, Karl Dias, Yujun Wang
"... Oracle Database Replay has been recently introduced in Oracle 11g as a novel tool to test relational database systems [9]. It involves recording the workload running on the database server in a production system, and subsequently replaying it on the database server in a test system. A key feature of ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
of workload replay that enables realistic reproduction of a real workload is synchronization. It is a mechanism that enforces specific ordering on the replayed requests that comprise the workload. It affects the level of request concurrency and the consistency of the replay results when compared

2011 IEEE Symposium on Security and Privacy Memoir: Practical State Continuity for Protected Modules

by Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, Jonathan M. Mccune
"... Abstract—To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This requires more than just preserving state confidentiality and integrity, since, e.g., software may err if its state is rolled back to ..."
Abstract - Add to MetaCart
to ensure rollback resistance without making the system vulnerable to system crashes. It does this by using a deterministic module, storing a concise summary of the module’s request history in protected NVRAM, and allowing only safe request replays after crashes. Since frequent NVRAM writes are impractical
Next 10 →
Results 1 - 10 of 749
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University