Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Jed Liu"'
Autor:
Chong, Stephen1 schong@cs.cornell.edu, Jed Liu1 liujed@cs.cornell.edu, Myers, Andrew C.1 andru@cs.cornell.edu, Xin Qi1 qixin@cs.cornell.edu, Vikram, K.1 kvikram@cs.cornell.edu, Lantian Zheng1 zlt@cs.cornell.edu, Xin Zheng1 xinz@cs.cornell.edu
Publikováno v:
Communications of the ACM. Feb2009, Vol. 52 Issue 2, p79-87. 9p. 1 Diagram, 5 Charts.
Autor:
Jed Liu1 liujed@cs.cornell.edu, Arden, Owen1 owen@cs.cornell.edu, George, Michael D.1 mdgeorge@cs.cornell.edu, Myers, Andrew C.1 andru@cs.cornell.edu
Publikováno v:
Journal of Computer Security. 2017, Vol. 25 Issue 4/5, p367-426. 60p.
Publikováno v:
Journal of Computer Security. 25:367-426
Publikováno v:
EuroSys
To achieve good performance, modern applications often partition their state across multiple geographically distributed nodes. While this approach reduces latency in the common case, it can be challenging for programmers to use correctly, especially
Autor:
William T. Hallahan, Calin Cascaval, Nick McKeown, Jeongkeun Lee, Jed Liu, Cole Schlesinger, Milad Sharif, Han Wang, Nate Foster, Robert Soulé
Publikováno v:
SIGCOMM
We present the design and implementation of p4v, a practical tool for verifying data planes described using the P4 programming language. The design of p4v is based on classic verification techniques but adds several key innovations including a novel
Autor:
Andrew Ferraiuolo, Mulong Luo, Joe Corbett-Davies, Andrew C. Myers, Jed Liu, G. Edward Suh, Mark Campbell, Alexander Ivanov
Publikováno v:
CPS-SPC@CCS
Modern cyber-physical systems are complex networked computing systems that electronically control physical systems. Autonomous road vehicles are an important and increasingly ubiquitous instance. Unfortunately, their increasing complexity often leads
Publikováno v:
ACM Conference on Computer and Communications Security
Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism for ensuring reliability and con
Publikováno v:
Communications of the ACM. 52:79-87
Swift is a new, principled approach to building Web applications that are secure by construction. Modern Web applications typically implement some functionality as client-side JavaScript code, for improved interactivity. Moving code and data to the c
Publikováno v:
SOSP
Swift is a new, principled approach to building web applications that are secure by construction . In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to th
Publikováno v:
CSF
Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flow