enter search term and/or author name
Cryptography as an operating system service: A case study
Angelos D. Keromytis, Jason L. Wright, Theo De Raadt, Matthew Burnside
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator cards. However, until now no operating system provided a mechanism that...
Performance analysis of TLS Web servers
Cristian Coarfa, Peter Druschel, Dan S. Wallach
TLS is the protocol of choice for securing today's e-commerce and online transactions but adding TLS to a Web server imposes a significant overhead relative to an insecure Web server on the same platform. We perform a comprehensive study of the...
The costs and limits of availability for replicated services
Haifeng Yu, Amin Vahdat
As raw system performance continues to improve at exponential rates, the utility of many services is increasingly limited by availability rather than performance. A key approach to improving availability involves replicating the service across...