Now showing items 1-10 of 149
Scalable Linux Scheduling
(Center for Information Technology Integration, 2001-05-01)
For most of its existence, Linux has been used primarily as a personal desktop operating system. Yet, in recent times, its use as a cost-efficient alternative to commercial operating systems for network servers, distributed ...
Extending NFSv4 for Petascale Data Management
(Center for Information Technology Integration, 2006-05-01)
Designed with Internet data management in mind, NFSv4 is meeting the needs of widely distributed collaborations. Anticipating terascale and petascale HPC demands, NFSv4 architects are designing pNFS, a standard extension ...
Secure Coprocessor Integration with Kerberos V5
(Center for Information Technology Integration, 2000-03-22)
The nightmare of Trusted Third Party (t3P) based protocol users is compromise of the T3P. Because the compromised T3P can read and modify any user information, the entire user group becomes vulnerable to secret revelation ...
The 10 Mbps Advanced Packet Vault
(Center for Information Technology Integration, 2001-10-04)
This paper describes the Advanced Packet Vault, a cryptographically secured archiver of network packet data that reliably captures all packets on a 10 Mbps Ethernet network, encrypts them, and writes them to long-term ...
malloc() Performance in a Multithreaded Linux Environment
(Center for Information Technology Integration, 2000-05-02)
Network servers make special demands that other types of applications may not make on memory allocators. We describe a simple malloc() microbenchmark suite that tests the ability of malloc() to divide its work efficiently ...
Efficient Kerberized Multicast in a Practical Distributed Setting
(Center for Information Technology Integration, 2001-08-21)
Many of today's distributed applications are based on group communication. Given the openness of today's networks, communication among group members must be secure and, at the same time, efficient. In this paper we consider ...
Clouseau Evaluation for Peer-to-Peer Transfer Operations
(Center for Information Technology Integration, 2008-03-05)
We evaluate whether Clouseau, a commercial product from SafeMedia, Inc., is effective in discriminating between risky and non-risky P2P operations. We construct a testbed and assess the Clouseau's efficacy in interdicting ...