Search For:

Displaying 1-5 out of 5 total
HotMobile 2013
Found in: IEEE Pervasive Computing
By Aarathi Prasad,Michael Butkiewicz
Issue Date:July 2013
pp. 85-88
HotMobile 13 highlighted how mobile computing has helped improve lives--for example, by providing better facilities to people in areas with resource constraints and helping traffic-clogged cities with carpooling. Yet mobile computing still has a long way t...
 
Twitsper: Tweeting privately
Found in: IEEE Security & Privacy
By Indrajeet Singh,Michael Butkiewicz,Harsha V. Madhyastha,Srikanth V. Krishnamurthy,Sateesh Addepalli
Issue Date:May 2013
pp. 46-50
Although today's online social networks provide some privacy controls to protect a user's shared content from other users, these controls aren't sufficiently expressive to provide fine-grained protection. Twitsper offers fine-grained control over who sees ...
 
SPANStore: cost-effective geo-replicated storage spanning multiple cloud services
Found in: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13)
By Dorian Perkins, Ethan Katz-Bassett, Harsha V. Madhyastha, Michael Butkiewicz, Zhe Wu
Issue Date:November 2013
pp. 292-308
By offering storage services in several geographically distributed data centers, cloud computing platforms enable applications to offer low latency access to user data. However, application developers are left to deal with the complexities associated with ...
     
CSPAN: cost-effective geo-replicated storage spanning multiple cloud services
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Dorian Perkins, Ethan Katz-Bassett, Harsha V. Madhyastha, Michael Butkiewicz, Zhe Wu
Issue Date:August 2013
pp. 545-546
Existing cloud computing platforms leave it up to applications to deal with the complexities associated with data replication and propagation across data centers. In our work, we propose the CSPAN key-value store to instead export a unified view of storage...
     
Enabling private conversations on Twitter
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Harsha V. Madhyastha, Indrajeet Singh, Michael Butkiewicz, Sateesh Addepalli, Srikanth V. Krishnamurthy
Issue Date:December 2012
pp. 409-418
User privacy has been an increasingly growing concern in online social networks (OSNs). While most OSNs today provide some form of privacy controls so that their users can protect their shared content from other users, these controls are typically not suff...
     
 1