SecureBlox: customizable secure distributed data processing
暂无分享,去创建一个
Micah Sherr | Shan Shan Huang | Boon Thau Loo | Molham Aref | Martin Bravenboer | William R. Marczak
[1] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[2] David Chu,et al. Evita raced: metacompilation for declarative networks , 2008, Proc. VLDB Endow..
[3] Roxana Geambasu,et al. CloudViews: Communal Data Sharing in Public Clouds , 2009, HotCloud.
[4] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[5] Martín Abadi. On Access Control, Data Integration, and Their Languages , 2004 .
[6] Martín Abadi,et al. Towards a Declarative Language and System for Secure Networking , 2007, NetDB.
[7] Georg Lausen,et al. On Chase Termination Beyond Stratification , 2009, Proc. VLDB Endow..
[8] Joseph M. Hellerstein,et al. I do declare: consensus in a logic language , 2010, OPSR.
[9] Peter Sewell,et al. Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[10] Martín Abadi,et al. Unified Declarative Platform for Secure Netwoked Information Systems , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[11] V. S. Subrahmanian,et al. Maintaining views incrementally , 1993, SIGMOD Conference.
[12] G. Weikum. Querying the Internet with PIER , 2005 .
[13] David Zook,et al. Declarative Reconfigurable Trust Management , 2009, CIDR.
[14] Yannis Smaragdakis,et al. Exception analysis and points-to analysis: better together , 2009, ISSTA.
[15] Alin Deutsch,et al. The chase revisited , 2008, PODS.
[16] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[17] Joseph M. Hellerstein,et al. Boom analytics: exploring data-centric, declarative programming for the cloud , 2010, EuroSys '10.
[18] Ion Stoica,et al. Declarative routing: extensible routing with declarative queries , 2005, SIGCOMM '05.
[19] Yannis Smaragdakis,et al. Strictly declarative specification of sophisticated points-to analyses , 2009, OOPSLA '09.
[20] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[21] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[22] Ion Stoica,et al. Implementing declarative overlays , 2005, SOSP '05.
[23] John DeTreville,et al. Binder, a logic-based security language , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[24] William F. Clocksin,et al. Programming in Prolog , 1987, Springer Berlin Heidelberg.
[25] Ion Stoica,et al. Declarative networking: language, execution and optimization , 2006, SIGMOD Conference.