2002 - Fellow of Alfred P. Sloan Foundation
Computer security and Hash function are frequently intertwined in his study. His Hash function study frequently draws connections to adjacent fields such as Computer security. His Network packet study frequently draws parallels with other fields, such as Stateless protocol. His Stateless protocol study frequently links to adjacent areas such as Network packet. He integrates many fields in his works, including Operating system and Control flow. In his study, David Mazières carries out multidisciplinary Control flow and Operating system research. David Mazières combines topics linked to Cloud computing security with his work on Security information and event management. As part of his studies on Cloud computing security, he often connects relevant areas like Covert channel. David Mazières regularly ties together related areas like Security information and event management in his Covert channel studies.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
Petar Maymounkov;David Mazières.
international workshop on peer to peer systems (2002)
A low-bandwidth network file system
Athicha Muthitacharoen;Benjie Chen;David Mazières.
symposium on operating systems principles (2001)
Making information flow explicit in HiStar
Nickolai Zeldovich;Silas Boyd-Wickizer;Eddie Kohler;David Mazières.
Communications of The ACM (2011)
Fast and secure distributed read-only file system
Kevin Fu;M. Frans Kaashoek;David Mazières.
ACM Transactions on Computer Systems (2002)
The case for RAMClouds: scalable high-performance storage entirely in DRAM
John Ousterhout;Parag Agrawal;David Erickson;Christos Kozyrakis.
Operating Systems Review (2010)
Democratizing content publication with coral
Michael J. Freedman;Eric Freudenthal;David Mazières.
networked systems design and implementation (2004)
Secure untrusted data repository (SUNDR)
Jinyuan Li;Maxwell Krohn;David Mazières;Dennis Shasha.
operating systems design and implementation (2004)
Separating key management from file system security
David Mazières;Michael Kaminsky;M. Frans Kaashoek;Emmett Witchel.
symposium on operating systems principles (1999)
On-the-fly verification of rateless erasure codes for efficient content distribution
M.N. Krohn;M.J. Freedman;D. Mazieres.
ieee symposium on security and privacy (2004)
Labels and event processes in the asbestos operating system
Petros Efstathopoulos;Maxwell Krohn;Steve VanDeBogart;Cliff Frey.
symposium on operating systems principles (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: