Search For:

Displaying 1-6 out of 6 total
Plug into the Supercloud
Found in: IEEE Internet Computing
By Dan Williams,Hani Jamjoom,Hakim Weatherspoon
Issue Date:March 2013
pp. 28-34
Cloud computing is often compared to the power utility model, but today's cloud providers don't simply supply raw computing resources as a commodity; they also act as distributors, dictating cloud services that aren't compatible across providers. A supercl...
Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees
Found in: Network Computing and Applications, IEEE International Symposium on
By Dan Williams, Emin Gün Sirer
Issue Date:September 2004
pp. 383-388
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly emerging hardware, such as those developed as part of the TCPA and Palladium initiatives, enables operating systems to implement such an environment through Me...
Cementing high availability in openflow with RuleBricks
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Dan Williams, Hani Jamjoom
Issue Date:August 2013
pp. 139-144
Controller applications in OpenFlow cannot be trivially augmented to support the various high availability (or failure recovery) models of server applications. Recent work on OpenFlow has largely assumed static replica configurations or has relied on contr...
Mizan: a system for dynamic load balancing in large-scale graph processing
Found in: Proceedings of the 8th ACM European Conference on Computer Systems (EuroSys '13)
By Amani Alonazi, Dan Williams, Hani Jamjoom, Karim Awara, Panos Kalnis
Issue Date:April 2013
pp. 169-182
Pregel [23] was recently introduced as a scalable graph mining system that can provide significant performance improvements over traditional MapReduce implementations. Existing implementations focus primarily on graph partitioning as a preprocessing step t...
The Xen-Blanket: virtualize once, run everywhere
Found in: Proceedings of the 7th ACM european conference on Computer Systems (EuroSys '12)
By Dan Williams, Hakim Weatherspoon, Hani Jamjoom
Issue Date:April 2012
pp. 113-126
Current Infrastructure as a Service (IaaS) clouds operate in isolation from each other. Slight variations in the virtual machine (VM) abstractions or underlying hypervisor services prevent unified access and control across clouds. While standardization eff...
Secure and practical defense against code-injection attacks using software dynamic translation
Found in: Proceedings of the 2nd international conference on Virtual execution environments (VEE '06)
By Adrian Filipi, Anh Nguyen-Tuong, Dan Williams, David Evans, Jack W. Davidson, Jason Hiser, John C. Knight, Jonathan Rowanhill, Wei Hu
Issue Date:June 2006
pp. 2-12
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be executed. A theoretically strong approach to defending against any type of co...