A Dual Digraph Approach for Leaderless Atomic Broadcast
Marius Poke and Colin W. Glass
A Generic Construction for All Parameters in Minimum Storage Regenerating Codes
Liuqing Ye, Dan Feng, Yuchong Hu and Xueliang Wei
A More Consistent Understanding of Consistency
Subhajit Sidhanta, Ricardo Dias and Rodrigo Rodrigues
Anonymous and Confidential File Sharing over Untrusted Clouds
Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber and Laurent Réveillère
Architecture and prototype implementation for process-aware intrusion detection in electrical grids
Robert Flosbach, Justyna Chromik and Anne Remke
Attack-resistant Spanning Tree Construction in Route-Restricted Overlay Networks
Martin Byrenheid, Stefanie Roos and Thorsten Strufe
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Bernardo Ferreira, Bernardo Portela, Tiago Oliveira, Guilherme Borges, Henrique Domingos and João Leitão
Blockchain-based Metadata Protection for Archival Systems
Arnaud L'Hutereau, Dorian Burihabwa, Pascal Felber, Hugues Mercier and Valerio Schiavoni
Bloxy: Providing Transparent and Generic BFT-Based Ordering Services for Blockchains
Signe Rüsch, Rüdiger Kapitza and Kai Bleeke
Challenges and Opportunities for Efficient Serverless Computing at the Edge
Phani K. Gadepalli, Gregor Peach, Ludmila Cherkasova, Rob Aitken, Gabriel Parmer
Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing
Uttam Thakore, Rohit Ranchal, Yi-Hsiu Wei, and Harigovind Ramasamy
d’Artagnan: a Trusted NoSQL Database on Untrusted Clouds
Rogério Pontes, Francisco Maia, Nuno Machado and Ricardo Vilaça
DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance Degradation
Jingjing Zhang, Yingyao Rong, Jiannong Cao, Chunming Rong, Jing Bian and Weigang Wu
Deterministic Fuzzy Checkpoints
Michael Eischer, Markus Büttner and Tobias Distler
Emergent Overlays for Adaptive MANET Broadcast
Raziel Carvajal Gomez, Yérom-David Bromberg, Yehia Elkhatib, Laurent Réveillère and Etienne Rivière
ESCAPe: Elastic Caching For Big Data Systems
Thanasis Priovolos, Stathis Maroulis and Vana Kalogeraki
Exploring Declustered Software RAID for Enhanced Reliability and Recovery Performance in Storage Systems
Zhi Qiao, Song Fu, Hsing-Bung Chen and Bradley Settlemyer
Fault Tolerant High Performance Solver for Linear Equation Systems
Marcello Artioli, Daniela Loreti and Anna Ciampolini
Fulva: Efficient Live Migration for In-memory Key-Value Stores with Zero Downtime
Jiewen Hai, Cheng Wang and Heming Cui
Fuzzing IPC with Knowledge Inference
Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge and Haixin Duan
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs
Habib Saissi, Marco Serafini and Neeraj Suri
Improved Fast Rerouting Using Postprocessing
Klaus-Tycho Förster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid and Gilles Tredan
Lightweight Dynamic Redundancy Control for Server-based Storage
Takayuki Fukatani, Hieu Hanh Le and Haruo Yokota
Making Speculative BFT Resilient with Trusted Monotonic Counters
Lachlan Gunn, Jian Liu, Bruno Vavala and N Asokan
Merkle Search Trees: Efficient State-Based CRDTs in Open Networks
Alex Auvolat and François Taïani
Multilevel Checkpoint/Restart for Large Computational Jobs on Distributed Computing Resources
Masoud Gholami Estahbanati and Florian Schintke
P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming
Jérémie Decouchant, Antoine Boutet, Jiangshan Yu and Paulo Esteves-Veríssimo
Preacher: Network Policy Checker for Adversarial Environments
Kashyap Thimmaraju, Liron Schiff and Stefan Schmid
Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication
Christian Berger, Hans P. Reiser, João Sousa and Alysson Bessani
Revisiting Broadcast Algorithms for Wireless Edge Networks
André Rosa, Pedro Ákos Costa and João Leitão
Scalability and resilience in practice: current trends and opportunities
Mark Little and Julien Ponge
Supply Chain Malware Targets SGX: Take Care of What You Sign (Practical Experience Report)
Andrei Mogage, Rafael Pires, Vlad Crăciun, Pascal Felber and Emanuel Onica
THUNDERSTORM: a tool to evaluate dynamic network topologies on distributed systems
Luca Liechti, Paulo Gouveia, João Neves, Peter Kropf, Miguel Matos and Valerio Schiavoni
Toward an in-kernel high performance key-value store implementation
Kahina Lazri, Antoine Blin, Julien Sopena, and Gilles Muller
Trusted Computing meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric
Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza and Alessandro Sorniotti