Now showing items 9-23 of 23

    • Latency- and Bandwidth-Minimizing Optimal Failure Detectors 

      So, Kelvin; Sirer, Emin Gun (Cornell University, 2006-05-01)
      Failure detectors are fundamental building blocks in distributed systems. Multi-node failure detectors, where the detector is tasked with monitoring other nodes, play a critical role in overlay networks and peer-to-peer ...
    • A Lightweight Approach to Network Positioning 

      Wong, Bernard; Sirer, Emin Gun (Cornell University, 2004-08-04)
      This paper describes a peer-to-peer overlay network for performing location-aware node and path selection in large-scale distributed systems. Our system, Meridian, provides a simple, lightweight and scalable framework for ...
    • Logical Attestation: An Authorization Architecture for Trustworthy Computing 

      Sirer, Emin Gun; de Bruijn, William; Reynolds, Patrick; Shieh, Alan; Walsh, Kevin; Williams, Dan; Schneider, Fred (2011-09-20)
      ABSTRACT This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation, this architecture provides a sound framework ...
    • A Measurement Study of a Publish Subscribe System 

      Liu, Hongzhou; Sirer, Emin Gun (Cornell University, 2005-05-16)
      While publish-subscribe systems have attracted much research interest in the last decade, few established benchmarks have emerged and there has been little characterization of how they are used in practice. This paper ...
    • Meridian: A Lightweight Framework for Network Positioning without Virtual Coordinates 

      Wong, Bernard; Slivkins, Aleksandrs; Sirer, Emin Gun (Cornell University, 2005-03-04)
      Selecting nodes based on their position in the network is a basic building block for many distributed systems. This paper describes a peer-to-peer overlay network for performing position-based node selection. Our system, ...
    • NetQuery: A General-Purpose Channel for Reasoning about Network 

      Shieh, Alan; Kennedy, Oliver; Sirer, Emin Gun; Schneider, Fred (2009-05-15)
      Although the configuration of modern networks has a significant impact on the performance, robustness, and security of applications, networks lack support for reporting these differences. This paper presents the design ...
    • Nexus Authorization Logic (NAL): Design Rationale and Applications 

      Schneider, Fred B.; Walsh, Kevin; Sirer, Emin Gun (2009-09-14)
      Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics based on "says" and "speaksfor" operators, ...
    • Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts 

      Wong, Bernard; Stoyanov, Ivan; Sirer, Emin Gun (Cornell University, 2006-07-17)
      This paper outlines a novel, comprehensive framework for geolocalization, that is, determining the physical location of Internet hosts based on network measurements. The core insight behind this framework is to pose the ...
    • Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash trees 

      Williams, Daniel; Sirer, Emin Gun (Cornell University, 2004-07-19)
      A secure, tamper proof execution environment is critical for trustworthy network computing. Newly emerging hardware, such as those developed as part of the TCPA and Palladium initiatives, enables operating systems to ...
    • Optimal Resource Utilization in Content Distribution Networks 

      Song, Yee Jiun; Ramasubramanian, Venugopalan; Sirer, Emin Gun (Cornell University, 2005-11-14)
      This paper examines replication in content distribution networks and proposes a novel mechanism for optimally resolving performance versus cost tradeoffs. The key insight behind our work is to formally and analytically ...
    • Peer-to-Peer Authentication with a Distributed Single Sign-On Service 

      Josephson, William; Sirer, Emin Gun; Schneider, Fred B. (Cornell University, 2004-02-16)
      CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication servers potentially residing in separate administrative ...
    • Perils of Transitive Trust in the Domain Name System 

      Ramasubramanian, Venugopalan; Sirer, Emin Gun (Cornell University, 2005-05-16)
      The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results from a large scale survey of DNS that shows ...
    • Securing BGP Using External Security Monitors 

      Reynolds, Patrick; Kennedy, Oliver; Sirer, Emin Gun; Schneider, Fred (Cornell University, 2006-12-21)
      Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally ...
    • TAF: A Temporal Adaptation Framework for Hybrid Routing in Mobile AdHoc Networks 

      Ramasubramanian, Venugopalan; Sirer, Emin Gun (Cornell University, 2002-03-05)
      A central challenge in ad hoc networks is the design of routing protocols that can adapt their behavior to frequent and rapid changes at the network level. Choosing between reactive, proactive, or hybrid routing regimes ...
    • Thwarting P2P Pollution Using Object Reputation 

      Walsh, Kevin; Sirer, Emin Gun (Cornell University, 2005-02-23)
      This paper describes a distributed object reputation management scheme that counteracts content pollution in peer-to-peer filesharing systems. The proposed scheme allows honest peers to assess the authenticity of online ...