Can You Engineer Privacy?
“Can You Engineer Privacy?” featured in Aug 2014 CACM has one of the best start paragraphs I have seen. Following this strong start, the article articulately introduces some of the challenge and areas...
View ArticleMacaroons: Cookies with Contextual Caveats for Decentralized Authorization in...
There has been lot of buzz about the latest alternative to cookies from Google, Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. Its well worth a read.
View ArticleCFP: FOG Networking for 5G and IoT
This seems like an interesting venue for work on edge network distributed systems. Nice to see that we are not the only ones who think that the edge is area worth researching. CFP: Fog Networking for...
View ArticleReading list for P2P Systems
This Harvard course page has a nice reading list to get you started.
View ArticleMOOC for edge networking and IoT
This course maybe of interest to readers, titled “Fog Networks and the Internet of Things”. This course teaches the fundamentals of Fog Networking, the network architecture that uses one or a...
View ArticleMiddleboxes considered harmful: DNS Edition
This article is brief overview of how middleboxes interact with DNS traffic. In particular I’m interested in finding out the answers to the following: Will middleboxes drop/modify DNS traffic and what...
View ArticleConservative election in Byzantine Fault Tolerant Raft
Tangaroa, is a Byzantine tolerant Raft implementation in Haskell, developed by Christopher Copeland and Hongxia Zhong for a Distributed Systems class at Stanford. The authors apply many of the...
View ArticlePaper notes on S-Paxos [SRDS’12]
The following is a paper notes for “S-Paxos: Offloading the Leader for High Throughput State Machine Replication”. This paper was recommended to me as a example of high-throughput consensus, achieved...
View Article
More Pages to Explore .....