We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, aside from covert timing channels, no part of the service cancorrupt private data or leak it between users or outside the systemwithout permission from the data's owners.Instead, owners may choose to reveal their data in a controlled manner.This application model is demonstrated by Muenster, a job searchwebsite that protects both the integrity and secrecy of each user's data.In spite of running untrusted code, Muenster and other services canprevent overt leaks because the untrusted modules are constrained bythe operating...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Abstract: Software services offer many opportunities like reduced cost for IT infras-tructure. They ...
Thesis (Ph.D.)--University of Washington, 2016-08Today, it is common to connect to Internet-based se...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Many modern web-platforms are no longer written by a single entity, such as a company or individual,...
Modern extensible web platforms like Facebook and Yammer depend on third-party software to offer a r...
Foundational software systems such as operating systems and web servers are implemented in unsafe pr...
As the wealth of quality application services grows, so too does the volume of data that users disc...
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compr...
The amount of digital data generated and stored by users increases every day. In order to protect th...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Abstract: Software services offer many opportunities like reduced cost for IT infras-tructure. They ...
Thesis (Ph.D.)--University of Washington, 2016-08Today, it is common to connect to Internet-based se...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Many modern web-platforms are no longer written by a single entity, such as a company or individual,...
Modern extensible web platforms like Facebook and Yammer depend on third-party software to offer a r...
Foundational software systems such as operating systems and web servers are implemented in unsafe pr...
As the wealth of quality application services grows, so too does the volume of data that users disc...
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compr...
The amount of digital data generated and stored by users increases every day. In order to protect th...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Abstract: Software services offer many opportunities like reduced cost for IT infras-tructure. They ...
Thesis (Ph.D.)--University of Washington, 2016-08Today, it is common to connect to Internet-based se...