Barbara Liskov

Results: 99



#Item
21MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-01-17 23:19:33
22Summarizing Audit Trails in the Aeolus Security Platform by Wissam Jarjoui S.B., C.S M.I.T., 2011

Summarizing Audit Trails in the Aeolus Security Platform by Wissam Jarjoui S.B., C.S M.I.T., 2011

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2013-01-03 11:45:32
23Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 29, 2010

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 29, 2010

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2010-09-29 17:43:14
24A File System Design for the Aeolus Security Platform by Francis Peter McKee S.B., C.S. M.I.T., 2011 Submitted to the Department of Electrical Engineering and Computer Science

A File System Design for the Aeolus Security Platform by Francis Peter McKee S.B., C.S. M.I.T., 2011 Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-03-20 16:20:12
25Aeolus Reference Manual Barbara Liskov Contents 1 Introduction

Aeolus Reference Manual Barbara Liskov Contents 1 Introduction

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2012-08-09 14:39:36
26Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRApril 16, 2009

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRApril 16, 2009

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2009-11-09 18:42:18
27Tolerating Byzantine Faulty Clients in a Quorum System Barbara Liskov MIT CSAIL Cambridge, MA, USA  Rodrigo Rodrigues

Tolerating Byzantine Faulty Clients in a Quorum System Barbara Liskov MIT CSAIL Cambridge, MA, USA Rodrigo Rodrigues

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2008-08-05 15:03:35
28Chapter 7  From Viewstamped Replication to Byzantine Fault Tolerance Barbara Liskov

Chapter 7 From Viewstamped Replication to Byzantine Fault Tolerance Barbara Liskov

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-03-20 16:20:12
29E. Bibliography  [1] Abelson, Harold, and Sussman, Gerald Jay, Structure and Interpretation of Computer Programs. Cambridge, MA: MIT Press, 1985.

E. Bibliography [1] Abelson, Harold, and Sussman, Gerald Jay, Structure and Interpretation of Computer Programs. Cambridge, MA: MIT Press, 1985.

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-12-04 19:43:51
30Untrusted Hosts and Confidentiality: Secure Program Partitioning. S. Zdancewic, L. Zheng, N. Nystrom, A. C. Myers (Cornell) Call for Participation  18th ACM Symposium on

Untrusted Hosts and Confidentiality: Secure Program Partitioning. S. Zdancewic, L. Zheng, N. Nystrom, A. C. Myers (Cornell) Call for Participation 18th ACM Symposium on

Add to Reading List

Source URL: www.sosp.org

Language: English - Date: 2003-04-06 08:49:07