Author of the publication

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.

, , , and . USENIX Security Symposium, page 175-188. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Volley: Automated Data Placement for Geo-Distributed Cloud Services., , , , and . NSDI, page 17-32. USENIX Association, (2010)Measurement, modeling, and analysis of a peer-to-peer file-sharing workload, , , , , and . SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, page 314--329. New York, NY, USA, ACM, (2003)Measuring and analyzing the characteristics of Napster and Gnutella hosts, , and . Multimedia Syst., 9 (2): 170--184 (2003)MOESI-prime: preventing coherence-induced hammering in commodity workloads., , , , and . ISCA, page 670-684. ACM, (2022)Stop! Hammer time: rethinking our approach to rowhammer mitigations., , , and . HotOS, page 88-95. ACM, (2021)A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Proceedings of the Multimedia Computing and Networking Conference, (January 2002)Finding Content in File-Sharing Networks When You Can't Even Spell., , , and . IPTPS, (2007)A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Multimedia Computing and Networking (MMCN), (January 2002)Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS., , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 214-224. Springer, (2002)I am a sensor, and I approve this message., and . HotMobile, page 37-42. ACM, (2010)