John Linwood Griffin
John Linwood Griffin

Jagged Thoughts
jlgatcs.jhu.edu

  Affiliation history
Bibliometrics: publication history
Average citations per article13.96
Citation Count335
Publication count24
Publication years2000-2010
Available for download8
Average downloads per article561.50
Downloads (cumulative)4,492
Downloads (12 Months)95
Downloads (6 Weeks)8
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


24 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 24
Result page: 1 2

Sort by:

1 published by ACM
December 2010 ACM Transactions on Information and System Security (TISSEC): Volume 13 Issue 4, December 2010
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 6,   Downloads (12 Months): 42,   Downloads (Overall): 1,231

Full text available: PDFPDF
Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. For example, examination of 18 real intrusion tools reveals that most (15) ...
Keywords: intrusion detection, Storage

2 published by ACM
April 2010 EUROSEC '10: Proceedings of the Third European Workshop on System Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 517

Full text available: PdfPdf
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in and lack usable protection mechanisms, which makes cross-service sharing risky. Our framework allows multiple Web services shared access to a single ...
Keywords: cloud, data management, web services, access control

3 published by ACM
November 2009 DIM '09: Proceedings of the 5th ACM workshop on Digital identity management
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 9,   Downloads (Overall): 200

Full text available: PDFPDF
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is an important characteristic in the digital age. We propose a new holistic and context-free approach to quantifying reputation on the Internet, based ...
Keywords: digital persona, reputation, stock market, identity, social networking

4
October 2009 ESEM '09: Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 398

Full text available: PdfPdf
It is hard for security practitioners and decision-makers to know what level of protection they are getting from their investments in security, especially when they have invested in a number of technologies and processes which interact and combine together. It is even harder to estimate how well these investments can ...

5
December 2008
Bibliometrics:
Citation Count: 0

Enterprise and web applications require full-featured, "Google-quality" search capabilities, but such features are notoriously difficult to implement and maintain. Hibernate Search builds on the Lucene feature set and offers an easyto- implement interface that integrates seamlessly with Hibernate-the leading data persistence solution for Java applications. Hibernate Search in Action introduces ...

6
December 2008 ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6

In this paper we present a novel approach of using mathematical models and stochastic simulations to guide and inform security investment and policy change decisions. In particular, we investigate vulnerability management policies, and explore how effective standard patch management and emergency escalation based policies are, and how they can be ...
Keywords: risk analysis, security investment, vulnerability and threat management, simulation, modeling

7
December 2005 ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 68

We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high assurance have been proven useful for high-security environments that prioritize security over performance and code reuse, our approach aims at commercial security where near-zero performance overhead, ...

8
June 2005 HotDep'05: Proceedings of the First conference on Hot topics in system dependability
Publisher: USENIX Association
Bibliometrics:
Citation Count: 34

The focus of trusted computing efforts to date has been to create islands of trust in a sea of distrust, identifying these islands as dependable domains with a solid base that can be used for building applications upon which critical services depend. The aim of our work is to extend ...

9
February 2004
Bibliometrics:
Citation Count: 0


10
January 2004
Bibliometrics:
Citation Count: 3

Timing-accurate storage emulation offers a unique performance evaluation capability: the flexibility of simulation with the reality of experimental measurements. This allows a researcher to experiment with not-yet-existing storage components in the context of real systems executing real applications. As its name suggests, a timing-accurate storage emulator appears to the system ...

11
August 2003 SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Publisher: USENIX Association
Bibliometrics:
Citation Count: 32

Storage-based intrusion detection allows storage systems to watch for data modifications characteristic of system intrusions. This enables storage systems to spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. Further, an intrusion detection system (IDS) embedded in a storage device continues to ...

12
January 2002 FAST '02: Proceedings of the 1st USENIX Conference on File and Storage Technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2


13
January 2002 FAST '02: Proceedings of the 1st USENIX Conference on File and Storage Technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2


14
January 2002 FAST '02: Proceedings of the Conference on File and Storage Technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 11


15
January 2002 FAST '02: Proceedings of the Conference on File and Storage Technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 55


16
January 2002 FAST'02: Proceedings of the 1st USENIX conference on File and storage technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 7

Track-aligned extents (traxtents) utilize disk-specific knowledge to match access patterns to the strengths of modern disks. By allocating and accessing related data on disk track boundaries, a system can avoid most rotational latency and track crossing overheads. Avoiding these overheads can increase disk access efficiency by up to 50% for ...

17
January 2002 FAST'02: Proceedings of the 1st USENIX conference on File and storage technologies
Publisher: USENIX Association
Bibliometrics:
Citation Count: 5

Timing-accurate storage emulation fills an important gap in the set of common performance evaluation techniques for proposed storage designs: it allows a researcher to experiment with not-yet-existing storage components in the context of real systems executing real applications. As its name suggests, a timing-accurate storage emulator appears to the system ...

18
July 2001
Bibliometrics:
Citation Count: 6

From the Publisher: Enterprise JavaBeans (EJB) are a container-based component architecture that allow you to easily create secure, scalable and transactional enterprise applications. Developed as session beans, entity beans, or message-driven beans, EJBs are the critical business objects in any J2EE application. Professional EJB shows how to develop and deploy ...

19
June 2001
Bibliometrics:
Citation Count: 0

From the Publisher: "XML and SQL Server 2000 is a resource for SQL developers who need to learn about the new XML capabilities of SQL Server 2000. If you're a web developer who wants to utilize XML in your projects but are worried about the complexities of the standard or ...

20 published by ACM
November 2000 ASPLOS IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Publisher: ACM
Bibliometrics:
Citation Count: 42
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 858

Full text available: PDFPDF
For decades the RAM-to-disk memory hierarchy gap has plagued computer architects. An exciting new storage technology based on microelectromechanical systems (MEMS) is poised to fill a large portion of this performance gap, significantly reduce system power consumption, and enable many new applications. This paper explores the system-level implications of integrating ...
Also published in:
December 2000  ACM SIGARCH Computer Architecture News - Special Issue: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems (ASPLOS '00): Volume 28 Issue 5, Dec. 2000 December 2000  ACM SIGOPS Operating Systems Review: Volume 34 Issue 5, Dec. 2000



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us