|
Similar eBooks: eBooks related to Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source Anonymous |
PVFS: A Parallel File System for Linux Clusters
As Linux clusters have matured as platforms for low-cost, high-performance parallel computing, software packages to provide many key services have emerged, especially in areas such as message passing and networking. One area devoid of support, however, has been parallel file systems, which are critical for high-performance I/O on such clusters
Deployme: Tellme's Software and Content Manager
The package philosophy behind these tools is easily extended to rapidly changing content. However, we found these systems to be incomplete because they only cover one or two stages of the package update lifecycle.
IO-Lite: A Unified I/O Buffering and Caching System
For many users, the perceived speed of computing is increasingly dependent on the performance of networked server systems, underscoring the need for high performance servers. Unfortunately, general purpose operating systems provide inadequate support for server applications, leading to poor server performance and increased hardware cost of server systems.
Automatic I/O Hint Generation through Speculative Execution
Many applications, ranging from simple text search utilities to complex databases, issue large numbers of file access requests that cannot always be serviced by in-memory caches. Due to the disparity between processor speeds and disk access times, the execution times of these applications are often dominated by I/O latency
Resource Containers: A New Facility for Resource Management in Server Systems
Networked servers have become one of the most important applications of large computer systems. For many users, the perceived speed of computing is governed by server performance. We are especially interested in the performance of Web servers, since these must often scale to thousands or millions of users.
Intrusion Detection Through Dynamic Software Measurement
The thrust of this paper is to present a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. The theoretical foundation for the research program is based on the study of the software internal behavior.
Experience with EMERALD to Date
Anomaly detection involves the recognition of deviations from expected normal behavior, whereas misuse detection involves the detection of various types of misuse. The term ``intrusion detection' is often used to encompass both, but unfortunately suggests only the detection of intrusions rather than the broader scope of EMERALD.
Filters as a Language Support for Design Patterns in Object-Oriented Scripting Languages
Scripting languages are designed for glueing software components together. Such languages provide features like dynamic extensibility and dynamic typing with automatic conversion that make them well suited for rapid application development. Although these features entail runtime penalties, modern CPUs are fast enough to execute even large applications in scripting languages efficiently
Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these ``splits'' in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.
Design Strategies for Tamper-Resistant Card Processors
Smartcards promise numerous security benefits. They can participate in cryptographic protocols, and unlike magnetic stripe cards, the stored data can be protected against unauthorized access. However, the strength of this protection seems to be frequently overestimated.
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source Anonymous - Free eBook Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source Anonymous - Download ebook Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source Anonymous free
|
|
|