Author image not provided
 Alan Shieh

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article24.90
Citation Count249
Publication count10
Publication years2005-2014
Available for download7
Average downloads per article480.71
Downloads (cumulative)3,365
Downloads (12 Months)143
Downloads (6 Weeks)19
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


10 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 10 of 10
Sort by:

1
April 2014 NSDI'14: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 44

Multi-tenant datacenters represent an extremely challenging networking environment. Tenants want the ability to migrate unmodified workloads from their enterprise networks to service provider datacenters, retaining the same networking configurations of their home network. The service providers must meet these needs without operator intervention while preserving their own operational flexibility and ...

2 published by ACM
October 2011 SOSP '11: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Publisher: ACM
Bibliometrics:
Citation Count: 30
Downloads (6 Weeks): 5,   Downloads (12 Months): 56,   Downloads (Overall): 646

Full text available: PDFPDF
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation , this architecture provides a sound framework for reasoning about run time behavior of applications. Logical attestation is based on attributable, unforgeable statements about program properties, expressed in a ...
Keywords: trusted platform module, logic, credentials-based authorization

3 published by ACM
August 2011 SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 6,   Downloads (12 Months): 30,   Downloads (Overall): 648

Full text available: PDFPDF
This paper presents the design and implementation of NetQuery, a knowledge plane for federated networks such as the Internet. In such networks, not all administrative domains will generate information that an application can trust and many administrative domains may have restrictive policies on disclosing network information. Thus, both the trustworthiness ...
Keywords: knowledge plane, trustworthy computing, tpm
Also published in:
October 2011  ACM SIGCOMM Computer Communication Review - SIGCOMM '11: Volume 41 Issue 4, August 2011

4
March 2011 NSDI'11: Proceedings of the 8th USENIX conference on Networked systems design and implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 80

While today's data centers are multiplexed across many non-cooperating applications, they lack effective means to share their network. Relying on TCP's congestion control, as we show from experiments in production data centers, opens up the network to denial of service attacks and performance interference. We present Seawall, a network bandwidth ...

5 published by ACM
November 2010 CoNEXT '10 Student Workshop: Proceedings of the ACM CoNEXT Student Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 81

Full text available: PDFPDF
Depending on their configuration, administration, and provisioning, networks provide drastically different features. For instance, some networks provide little failure resilience while others provision failover capacity and deploy middleboxes to protect against denial of service attacks [1, 2]. Yet the standard IP interface masks these differences; every network appears to provide ...

6 published by ACM
October 2010 Hotnets-IX: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 302

Full text available: PDFPDF
This paper examines an extreme point in the design space of programmable switches and network policy enforcement. Rather than relying on extensive changes to switches to provide more programmability, SideCar distributes custom processing code between shims running on every end host and general purpose sidecar processors, such as server blades, ...
Keywords: datacenters, programmable switches, virtualized networks

7
June 2010 HotCloud'10: Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Publisher: USENIX Association
Bibliometrics:
Citation Count: 36

While today's virtual datacenters have hypervisor based mechanisms to partition compute resources between the tenants co-located on an end host, they provide little control over how tenants shore the network. This opens cloud applications to interference from other tenants, resulting in unpredictable performance and exposure to denial of service attacks. ...

8 published by ACM
September 2008 ACM Transactions on Computer Systems (TOCS): Volume 26 Issue 3, September 2008
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 3,   Downloads (12 Months): 20,   Downloads (Overall): 946

Full text available: PDFPDF
Traditional operating system interfaces and network protocol implementations force some system state to be kept on both sides of a connection. This state ties the connection to its endpoints, impedes transparent failover, permits denial-of-service attacks, and limits scalability. This article introduces a novel TCP-like transport protocol and a new interface ...
Keywords: Stateless interfaces, stateless protocols

9 published by ACM
October 2005 SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 3,   Downloads (12 Months): 13,   Downloads (Overall): 591

Full text available: PDFPDF
Tamper-proof coprocessors for secure computing are poised to become a standard hardware feature on future computers. Such hardware provides the primitives necessary to support trustworthy computing applications, that is, applications that can provide strong guarantees about their run time behavior.

10
May 2005 NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Publisher: USENIX Association
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 1,   Downloads (12 Months): 10,   Downloads (Overall): 151

Full text available: PDFPDF
Traditional operating system interfaces and network protocol implementations force system state to be kept on both sides of a connection. Such state ties the connection to an endpoint, impedes transparent failover, permits denial-of-service attacks, and limits scalability. This paper introduces a novel TCP-like transport protocol and a new interface to ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us