MoSAIC: Mobile System Availability Integrity and Confidentiality
暂无分享,去创建一个
[1] Mukesh Singhal,et al. Mutable Checkpoints: A New Checkpointing Approach for Mobile Computing Systems , 2001, IEEE Trans. Parallel Distributed Syst..
[2] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[3] Mukesh Singhal,et al. Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..
[4] Andrew V. Goldberg,et al. Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[5] Scott Shenker,et al. Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.
[6] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[7] Laurent Bussard. One-time authorization for off-line interactions , 2003 .
[8] Yves Deswarte,et al. Supporting multiple levels of criticality , 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224).
[9] Randy H. Katz,et al. Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices (Special Issue on Mobile Computing) , 1997 .
[10] Michel Banâtre,et al. Lessons from FTM: An Experiment in Design and Implementation of a Low-Cost Fault-Tolerant System , 1996, IEEE Trans. Reliab..
[11] Jean-Charles Fabre,et al. Portable serialization of CORBA objects: a reflective approach , 2002, OOPSLA '02.
[12] Yves Deswarte,et al. An Internet Authorization Scheme Using Smart-Card-Based Security Kernels , 2001, E-smart.
[13] Hein Meling,et al. Anthill: a framework for the development of agent-based peer-to-peer systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[14] Christopher Batten,et al. pStore: A Secure Peer-to-Peer Backup System∗ , 2007 .
[15] Val Henson,et al. An Analysis of Compare-by-hash , 2003, HotOS.
[16] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[17] Mahadev Satyanarayanan,et al. Opportunistic Use of Content Addressable Storage for Distributed File Systems , 2003, USENIX Annual Technical Conference, General Track.
[18] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[19] Ahmed Helmy. Efficient Resource Discovery in Wireless AdHoc Networks: Contacts Do Help , 2005 .
[20] Hector Garcia-Molina,et al. Bidding for storage space in a peer-to-peer data preservation system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[21] Gil Utard,et al. Data Distribution in a Peer to Peer Storage System , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[22] Michel Banâtre,et al. SPREADing the Web , 2003, PWC.
[23] Michel Banâtre,et al. Collaborative backup for dependable mobile applications , 2004, MPAC '04.
[24] Ralph Deters,et al. 3LS - a peer-to-peer network simulator , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[25] Gerd Kortuem,et al. Disseminating Trust Information in Wearable Communities , 2000 .
[26] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[27] W. Kent Fuchs,et al. Message logging in mobile computing , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[28] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[29] Cornelia Kappler,et al. Enabling Mobile Peer-to-Peer Networking , 2004, EuroNGI Workshop.
[30] Ethan L. Miller,et al. Long-Term file activity patterns in a UNIX workstation environment , 1998 .
[31] Krithi Ramamritham,et al. Support for Recovery in Mobile Systems , 2002, IEEE Trans. Computers.
[32] John Kubiatowicz,et al. Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.
[33] Walter F. Tichy,et al. An Empirical Study of Delta Algorithms , 1996, SCM.
[34] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[35] Michel Banâtre,et al. Ambient computing applications: an experience with the SPREAD approach , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[36] Michael Mitzenmacher,et al. Digital fountains: a survey and look forward , 2004, Information Theory Workshop.
[37] Peter L. Reiher,et al. Roam: a scalable replication system for mobile computing , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.
[38] Stefan Savage,et al. The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe , 2003, HotOS.
[39] Roger Dingledine,et al. The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .
[40] Peter A. Dinda,et al. Wayback: A User-level Versioning File System for Linux (Awarded Best Paper!) , 2004, USENIX Annual Technical Conference, FREENIX Track.
[41] Gerd Kortuem,et al. When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[42] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[43] Laurent Bussard,et al. History-Based Signature or How to Trust Anonymous Documents , 2004, iTrust.
[44] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[45] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[46] Christian Grothoff,et al. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks , 2005 .
[47] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[48] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[49] Kwong-Sak Leung,et al. Operation-based Update Propagation in a Mobile File System , 1999, USENIX Annual Technical Conference, General Track.
[50] L. Floridi,et al. The tragedy of the digital commons , 2004, Ethics and Information Technology.
[51] Michael Mitzenmacher,et al. Accessing multiple mirror sites in parallel: using Tornado codes to speed up downloads , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[52] Edward Grochowski,et al. Emerging Trends in Data Storage on Magnetic Hard Disk Drives , 1999 .
[53] Pekka Nikander. Fault Tolerance in Decentralized and Loosely Coupled Systems , 2000 .
[54] Heon Young Yeom,et al. An efficient recovery scheme for mobile computing environments , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.
[55] Mahadev Satyanarayanan,et al. Scalable, secure, and highly available distributed file access , 1990, Computer.
[56] Paul Mackerras,et al. The rsync algorithm , 1996 .
[57] Matthieu Roy,et al. Sauvegarde coopérative entre pairs pour dispositifs mobiles , 2005, UbiMob '05.
[58] Antoine Vernois,et al. Data durability in peer to peer storage systems , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[59] Jean-Charles Fabre,et al. Reflective Fault-Tolerant Systems: From Experience to Challenges , 2003, IEEE Trans. Computers.
[60] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[61] Norman C. Hutchinson,et al. Deciding when to forget in the Elephant file system , 1999, SOSP.
[62] Tyson Condie,et al. Simulating A File-Sharing P2P Network , 2003 .
[63] Dah Ming Chiu,et al. Erasure code replication revisited , 2004 .
[64] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[65] G. Hardin. The Tragedy of the Commons , 2009 .
[66] Valérie Issarny,et al. AdHocFS: sharing files in WLANs , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[67] Laurent Bussard,et al. Trust and Authorization in Pervasive B2E Scenarios , 2003, ISC.
[68] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[69] Darrell D. E. Long,et al. Deep Store: an archival storage system architecture , 2005, 21st International Conference on Data Engineering (ICDE'05).
[70] Serge Abiteboul,et al. Detecting changes in XML documents , 2002, Proceedings 18th International Conference on Data Engineering.
[71] Laurent Bussard,et al. Embedding Distance-Bounding Protocols within Intuitive Interactions , 2003, SPC.
[72] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[73] Vladimiro Sassone,et al. A Formal Model for Trust in Dynamic Networks , 2003 .
[74] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[75] Christian Grothoff,et al. Efficient Sharing of Encrypted Data , 2002, ACISP.
[76] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[77] Dennis Kügler,et al. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks , 2003, Privacy Enhancing Technologies.
[78] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[79] Jason Flinn,et al. Energy-Efficiency and Storage Flexibility in the Blue File System , 2004, OSDI.
[80] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[81] Valérie Issarny,et al. A Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability , 2003, Middleware.
[82] Kian-Lee Tan,et al. PeerStore: better performance by relaxing in peer-to-peer backup , 2004 .
[83] Lihao Xu,et al. Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.
[84] Gaetano Borriello,et al. Peer-To-Peer Backup for Personal Area Networks , 2003 .
[85] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[86] Jean-Marc Menaud,et al. SIDE surfer: enriching casual meetings with spontaneous information gathering , 2001, CARN.
[87] Fred Douglis,et al. Redundancy Elimination Within Large Collections of Files , 2004, USENIX Annual Technical Conference, General Track.
[88] Philipp Obreiter,et al. A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation , 2003, AP2PC.
[89] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[90] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[91] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[92] Laurent Bussard,et al. Untraceable secret credentials: trust establishment with privacy , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[93] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[94] Felix C. Freiling,et al. Using Smart Cards for Fair Exchange , 2001, WELCOM.
[95] Dhiraj K. Pradhan,et al. Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.
[96] Angelos D. Keromytis,et al. Offline Micropayments without Trusted Hardware , 2002, Financial Cryptography.
[97] Pekka Nikander,et al. Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties , 2002, Security Protocols Workshop.
[98] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[99] Anas Abou El Kalam,et al. Security Model for Health Care Computing and Communication Systems , 2003, SEC.
[100] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[101] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[102] David Mazières,et al. A low-bandwidth network file system , 2001, SOSP.
[103] Mario Kolberg,et al. Tools for Peer-to-Peer Network Simulation , 2006 .
[104] Sean Quinlan,et al. Venti: A New Approach to Archival Storage , 2002, FAST.
[105] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[106] Henning Schulzrinne,et al. Seven degrees of separation in mobile ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[107] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[108] Brian D. Noble,et al. Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.
[109] Masayuki Terada,et al. An Optimistic Fair Exchange Protocol for Trading Electronic Rights , 2004, CARDIS.
[110] Pietro Michiardi,et al. Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .
[111] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[112] Stefan Savage,et al. Total Recall: System Support for Automated Availability Management , 2004, NSDI.
[113] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[114] David Powell,et al. Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices , 2006, 2006 Sixth European Dependable Computing Conference.
[115] Kavitha Ranganathan,et al. Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[116] Udi Manber,et al. Finding Similar Files in a Large File System , 1994, USENIX Winter.
[117] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[118] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[119] Oliver P. Waldhorst,et al. A special-purpose peer-to-peer file sharing system for mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[120] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.