Items where Author is "Druschel, Peter"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 36.

Conference or Workshop Item (A Paper)

Mehta, Aastha and Elnikety, Eslam and Harvey, Katura and Garg, Deepak and Druschel, Peter
(2017) Qapla: Policy compliance for database-backed systems.
In: 26th USENIX Security Symposium (USENIX Security 17).
Conference: USENIX-Security Usenix Security Symposium

Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016) Light-Weight Contexts: An OS Abstraction for Safety and Performance.
In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16).
Conference: OSDI Usenix Symposium on Operating Systems Design and Implementation

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) T3: Comprehensive policy compliance in data retrieval systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Bhattacharjee, Bobby and Druschel, Peter and Herbster, Raul and DellaTorre, Scott
(2016) Privacy Capsules: Preventing Information Leaks by Mobile Apps.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016.

Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016) Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016) I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).

Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015) Guardat: enforcing data policies at the storage layer.
In: Proceedings of the 10th European Conference on Computer Systems (EuroSys '15).
Conference: EuroSys Eurosys Conference

Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
In: Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15).
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014) SDDR: Light-Weight, Secure Mobile Encounters.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.

Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014) Beyond Access Control: Managing Online Privacy via Exposure.
In: Proceedings of the Workshop on Useable Security (USEC'14).

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave new world: privacy risks for mobile users.
In: Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014.

Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014) EnCore: Private, Context-based Communication for Mobile Social Apps.
In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services.

Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013) Peer-assisted Content Distribution in Akamai Netsession.
In: Proc. of the 2013 Internet Measurement Conference (IMC'13).
Conference: IMC Internet Measurement Conference

Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013) Towards Efficient Traffic-analysis Resistant Anonymity Networks.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Druschel, Peter
(2012) Accountability and Trust in Cooperative Information Systems.
In: Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12).
Conference: ICDE International Conference on Data Engineering

Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Defending Against Large-scale Crawls in Online Social Networks.
In: Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012.
Conference: CoNEXT ACM International Conference on Emerging Networking Experiments and Technologies

Viswanath, Bimal and Mondal, Mainack and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Exploring the design space of social network-based Sybil defense.
In: Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012).

Aditya, Paarijaat and Zhao, Mingchen and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill
(2012) Reliable Client Accounting for P2P-infrastructure Hybrids.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012) Trusted Storage.
In: Presented at USENIX FAST'12 WiP.
Conference: FAST Conference on File and Storage Technologies

Post, Ansley and Navarro, Juan and Kuznetsov, Petr and Druschel, Peter
(2011) Autonomous Storage Management for Personal Devices with PodBase.
In: 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 15-17, 2011.
Conference: USENIX-Security Usenix Security Symposium

Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2011) Limiting large-scale crawls of social networking sites.
In: Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Haeberlen, Andreas and Aditya, Paarijaat and Rodrigues, Rodrigo and Druschel, Peter
(2010) Accountable Virtual Machines.
In: 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings.
Conference: USENIX-Security Usenix Security Symposium

Mislove, Alan and Viswanath, Bimal and Gummadi, Krishna P. and Druschel, Peter
(2010) You are who you know: inferring user profiles in online social networks.
In: Proceedings of the Third International Conference on Web Search and Web Data Mining, WSDM 2010, New York, NY, USA, February 4-6, 2010.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS Network and Distributed System Security Symposium

Article

Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.

Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.

Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5). pp. 639-652.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3). pp. 49-54.

Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013) Introducing Accountability to Anonymity Networks.
CoRR, abs/13.

Zhang, Bo and Ng, Tze Sing Eugene and Nandi, Animesh and Riedi, Rudolf H. and Druschel, Peter and Wang, Guohui
(2010) Measurement-based analysis, modeling, and synthesis of the internet delay space.
IEEE/ACM Trans. Netw., 18 (1). 229–242.

Rodrigues, Rodrigo and Druschel, Peter
(2010) Peer-to-peer systems.
Commun. ACM, 53 (10). 72–82.

This list was generated on Thu Nov 21 13:15:44 2024 CET.