Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleJuly 2013
Regenerating codes: a system perspective
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 47, Issue 2Pages 23–32https://doi.org/10.1145/2506164.2506170The explosion of the amount of data stored in cloud systems calls for more efficient paradigms for redundancy. While replication is widely used to ensure data availability, erasure correcting codes provide a much better trade-off between storage and ...
- research-articleDecember 2012
Space savings and design considerations in variable length deduplication
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 46, Issue 3Pages 57–64https://doi.org/10.1145/2421648.2421657Explosion of data growth and duplication of data in enterprises has led to the deployment of a variety of deduplication technologies. However not all deduplication technologies serve the needs of every workload. Most prior research in deduplication ...
- research-articleJanuary 2009
Providing secure services for a virtual infrastructure
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 43, Issue 1Pages 44–51https://doi.org/10.1145/1496909.1496919Virtualization brings exibility to the data center and enables separations allowing for better security properties. For these security properties to be fully utilized, virtual machines need to be able to connect to secure services such as networking and ...
- research-articleApril 2008
Seeing the invisible: forensic uses of anomaly detection and machine learning
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 3Pages 51–58https://doi.org/10.1145/1368506.1368514Anti-forensics is the practice of circumventing classical forensics analysis procedures making them either unreliable or impossible. In this paper we propose the use of machine learning algorithms and anomaly detection to cope with a wide class of ...
- research-articleMarch 2008
How low can you go?: recommendations for hardware-supported minimal TCB code execution
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 2Pages 14–25https://doi.org/10.1145/1353535.1346285We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although this new technology represents a step in the right direction, significant ...
Also Published in:
ASPLOS XIII: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems: ISBN 9781595939586 -
- research-articleJanuary 2008
TVDc: managing security in the trusted virtual datacenter
- Stefan Berger,
- Ramón Cáceres,
- Dimitrios Pendarakis,
- Reiner Sailer,
- Enriquillo Valdez,
- Ronald Perez,
- Wayne Schildhauer,
- Deepa Srinivasan
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 1Pages 40–47https://doi.org/10.1145/1341312.1341321Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and applications, in different virtual machines (VMs) on shared physical ...
- research-articleJanuary 2008
The Caernarvon secure embedded operating system
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 1Pages 32–39https://doi.org/10.1145/1341312.1341320The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the ...
- articleOctober 2005
The taser intrusion recovery system
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 5Pages 163–176https://doi.org/10.1145/1095809.1095826Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we argue that next generation systems should be built with automated ...
Also Published in:
SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles: ISBN 1595930795 - articleOctober 2005
Detecting past and present intrusions through vulnerability-specific predicates
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 5Pages 91–104https://doi.org/10.1145/1095809.1095820Most systems contain software with yet-to-be-discovered security vulnerabilities. When a vulnerability is disclosed, administrators face the grim reality that they have been running software which was open to attack. Sites that value availability may be ...
Also Published in:
SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles: ISBN 1595930795 - articleOctober 2005
An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 4Pages 66–79https://doi.org/10.1145/1088446.1088452Contract signing conducted over the Internet arouses concerns of fairness. Two signing parties exchange their signatures in a fair manner, so that no party can gain an advantage over the other. This paper will discuss the security issues of signers' ...
- articleJuly 2005
Enhancement of digital signature with message recovery using self-certified public keys and its variants
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 3Pages 90–96https://doi.org/10.1145/1075395.1075404In 2003, Tseng et al. proposed a self-certified public key signature with message recovery, which gives two advantages: one is that the signer's public key can simultaneously be authenticated in verifying the signature and the other one is that only the ...
- articleJuly 2005
The research on consistency of space/time of IDS
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 3Pages 44–51https://doi.org/10.1145/1075395.1075399A method of Intrude Detection based on Data Fusion is introduced and a new mechanism -- DFIDM has been presented in the paper. We focus in consistency of Space/Time during data collecting and object collecting. Multisensor will collect data such as log ...
- articleJuly 2005
An example of communication between security tools: iptables - snort
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 3Pages 34–43https://doi.org/10.1145/1075395.1075398Two of the most used tools in the area of computer security are the firewalls and the Intrusion Detection Systems. Both of them fulfill the task for which they were designed for but unfortunately their response to an attack can be limited. The ...
- articleJanuary 2005
Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 90–96https://doi.org/10.1145/1044552.1044562In 2002, Lee, Hwang, and Yang proposed a verifier-free remote user authentication scheme using smart cards. Their scheme is efficient because of mainly using cryptographic hash functions. However, we find that Lee-Hwang-Yang's scheme is not reparable ...
- articleJanuary 2005
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 85–89https://doi.org/10.1145/1044552.1044561In 2000, Peyravian and Zunic proposed an efficient hash-based password authentication scheme that can be easily implemented. Later, Lee, Li, and Hwang demonstrated that Peyravian-Zunic's scheme is vulnerable to an off-line guessing attack, and then ...
- articleJanuary 2005
A new multi-stage secret sharing scheme using one-way function
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 48–55https://doi.org/10.1145/1044552.1044557He and Dawson proposed a multi-stage secret sharing scheme based on one-way function. In that scheme, many secrets are reconstructed stage-by-stage in the dealer's predetermined order, and only one secret shadow is kept by every participant. When all ...
- articleJanuary 2005
Hierarchical key management scheme using polynomial interpolation
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 40–47https://doi.org/10.1145/1044552.1044556We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management. A similar technique has been proposed in 2002 by Shen and Chen, but their scheme ...
- articleJuly 2004
A key authentication scheme with non-repudiation
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 38, Issue 3Pages 75–78https://doi.org/10.1145/1035834.1035843In 1996, Horng and Yang proposed a key authentication scheme that requires no authorities. However, it is vulnerable to the guessing attack. An intruder can try out a password and forge the public key. To amend this problem, an improved authentication ...
- articleJuly 2004
An improvement on a deniable authentication protocol
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 38, Issue 3Pages 65–74https://doi.org/10.1145/1035834.1035842In 2002, Fan et al. proposed a deniable authentication protocol based on the Deffie-Hellman key agreement protocol. They guaranteed that the proposed protocol, which is deniable, can authenticate the source of the message and resist the person-in-the-...
- articleOctober 2003
Backtracking intrusions
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 37, Issue 5Pages 223–236https://doi.org/10.1145/1165389.945467Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically ...
Also Published in:
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles: ISBN 1581137575