Now showing items 28-30 of 3794

    • Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs 

      Chen, Benjie; Gil, Thomer M.; Muthitacharoen, Athicha; Morris, Robert T. (2003-03)
      L* is a technique for building multi-user distributed data structures out of untrusted peer-to-peer distributed hash tables (DHTs). L* uses multiple logs, one log per participant, to store changes to the data structure. ...
    • Efficient Consistency Proofs on a Committed Database 

      Ostrovsky, Rafail; Rackoff, Charles; Smith, Adam (2003-02)
      A consistent query protocol allows a database owner to publish a very short string c which commits her to a particular database D with special consistency property (i.e., given c, every allowable query has unique and ...
    • REX: Secure, modular remote execution through file descriptor passing 

      Kaminsky, Michael; Peterson, Eric; Fu, Kevin; Mazières, David; Kaashoek, M. Frans (2003-01)
      The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. This paper presents a new system, REX, designed to provide remote login and execution in the context of the SFS secure ...