Abstract is missing.
- Probabilistic Byzantine Tolerance for Cloud ComputingLuciana Arantes, Roy Friedman, Olivier Marin, Pierre Sens. 1-10 [doi]
- Privacy-Preserving Content-Based Image Retrieval in the CloudBernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos. 11-20 [doi]
- SafeSky: A Secure Cloud Storage Middleware for End-User ApplicationsRui Zhao, Chuan Yue, Byung-Chul Tak, Chunqiang Tang. 21-30 [doi]
- Extending Eventually Consistent Cloud Databases for Enforcing Numeric InvariantsValter Balegas, Diogo Serra, Sérgio Duarte, Carla Ferreira, Marc Shapiro, Rodrigo Rodrigues, Nuno M. Preguiça. 31-36 [doi]
- Auditable Restoration of Distributed ProgramsReza Hajisheykhi, Mohammad Roohitavaf, Sandeep S. Kulkarni. 37-46 [doi]
- PSG-Codes: An Erasure Codes Family with High Fault Tolerance and Fast RecoveryShiyi Li, Qiang Cao, Lei Tian, Shenggang Wan, Lu Qian, Changsheng Xie. 47-57 [doi]
- Recurrence in Self-StabilizationOday Jubran, Oliver E. Theel. 58-67 [doi]
- Multi-objective Optimisation of Rolling Upgrade Allowing for Failures in CloudsDaniel Sun, Daniel Guimarans, Alan Fekete, Vincent Gramoli, Liming Zhu. 68-73 [doi]
- PASS: An Address Space Slicing Framework for P2P Eclipse Attack MitigationDaniel Germanus, Hatem Ismail, Neeraj Suri. 74-83 [doi]
- ControlFreak: Signature Chaining to Counter Control Flow AttacksSergei Arnautov, Christof Fetzer. 84-93 [doi]
- Denial of Service Elusion (DoSE): Keeping Clients Connected for LessPaul Wood, Christopher N. Gutierrez, Saurabh Bagchi. 94-103 [doi]
- Temporality a NVRAM-based Virtualization PlatformVasily A. Sartakov, Arthur Martens, Rüdiger Kapitza. 104-109 [doi]
- A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor NetworksLei Dong, Xuan Chen, Jianxiang Zhu, Hong Chen, Ke Wang, Cuiping Li. 110-119 [doi]
- PmDroid: Permission Supervision for Android AdvertisingXing Gao, Dachuan Liu, Haining Wang, Kun Sun. 120-129 [doi]
- Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETsTakuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio. 130-139 [doi]
- FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression SchemesAzad Ali, Abdelmajid Khelil, Neeraj Suri. 140-145 [doi]
- Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State MachinesJoão Sousa, Alysson Bessani. 146-155 [doi]
- Replacement: Decentralized Failure Handling for Replicated State MachinesLeander Jehl, Tormod Erevik Lea, Hein Meling. 156-165 [doi]
- Approximate Hash-Based Set Reconciliation for Distributed Replica RepairNico Kruber, Maik Lange, Florian Schintke. 166-175 [doi]
- Securing Passive Replication through VerificationBruno Vavala, Nuno Neves, Peter Steenkiste. 176-181 [doi]
- PCM: A Parity-Check Matrix Based Approach to Improve Decoding Performance of XOR-based Erasure CodesYongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo. 182-191 [doi]
- MICS: Mingling Chained Storage Combining Replication and Erasure CodingYan Tang, Jianwei Yin, Wei Lo, Ying Li, ShuiGuang Deng, Kexiong Dong, Calton Pu. 192-201 [doi]
- Online Behavior Identification in Distributed SystemsJavier Alvarez Cid-Fuentes, Claudia Szabo, Katrina Falkner. 202-211 [doi]
- Z Codes: General Systematic Erasure Codes with Optimal Repair Bandwidth and Storage for Distributed Storage SystemsQing Liu, Dan Feng, Hong Jiang, Yuchong Hu, Tianfeng Jiao. 212-217 [doi]
- Distributed Attribute Based Access Control of Aggregated Data in Sensor CloudsVimal Kumar 0001, Sanjay Madria. 218-227 [doi]
- Seek-Efficient I/O Optimization in Single Failure Recovery for XOR-coded Storage SystemsZhirong Shen, Jiwu Shu, Yingxun Fu. 228-237 [doi]
- Communicating Reliably in Multihop Dynamic Networks Despite Byzantine FailuresAlexandre Maurer, Sébastien Tixeuil, Xavier Défago. 238-245 [doi]
- To Transmit Now or Not to Transmit NowDacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne Anne Pignolet. 246-255 [doi]
- Ridge: High-Throughput, Low-Latency Atomic MulticastCarlos Eduardo Benevides Bezerra, Daniel Cason, Fernando Pedone. 256-265 [doi]
- Identifying Global Icebergs in Distributed StreamsEmmanuelle Anceaume, Yann Busnel, Nicolo Rivetti, Bruno Sericola. 266-275 [doi]
- A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer SystemsGuido Lena Cota, Sonia Ben Mokhtar, Julia L. Lawall, Gilles Muller, Gabriele Gianini, Ernesto Damiani, Lionel Brunie. 276-285 [doi]
- Chasing the Tail of Atomic Broadcast ProtocolsDaniel Cason, Parisa Jalili Marandi, Luiz Eduardo Buzato, Fernando Pedone. 286-295 [doi]
- A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security IssuesRodrigo Sanches Miani, Bruno Bogaz Zarpelão, Bertrand Sobesto, Michel Cukier. 296-305 [doi]