Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 28-30 of 3794
-
Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs
(2003-03)L* is a technique for building multi-user distributed data structures out of untrusted peer-to-peer distributed hash tables (DHTs). L* uses multiple logs, one log per participant, to store changes to the data structure. ... -
Efficient Consistency Proofs on a Committed Database
(2003-02)A consistent query protocol allows a database owner to publish a very short string c which commits her to a particular database D with special consistency property (i.e., given c, every allowable query has unique and ... -
REX: Secure, modular remote execution through file descriptor passing
(2003-01)The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. This paper presents a new system, REX, designed to provide remote login and execution in the context of the SFS secure ...


