Compiling with continuations
Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Unreliable failure detectors for reliable distributed systems
Journal of the ACM (JACM)
Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
The Legion vision of a worldwide virtual computer
Communications of the ACM
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
The SLam calculus: programming with secrecy and integrity
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Making the future safe for the past: adding genericity to the Java programming language
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Type-safe linking and modular assembly language
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
The grid
From system F to typed assembly language
ACM Transactions on Programming Languages and Systems (TOPLAS)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Bayanihan: building and studying web-based volunteer computing systems using Java
Future Generation Computer Systems - Special issue on metacomputing
The Definition of Standard ML
Parallel Computer Architecture: A Hardware/Software Approach
Parallel Computer Architecture: A Hardware/Software Approach
Java Virtual Machine Specification
Java Virtual Machine Specification
Java Language Specification, Second Edition: The Java Series
Java Language Specification, Second Edition: The Java Series
Bayanihan: Web-Based Volunteer Computing Using Java
WWCA '98 Proceedings of the Second International Conference on Worldwide Computing and Its Applications
Safe, Untrusted Agents Using Proof-Carrying Code
Mobile Agents and Security
Confidentiality and Integrity with Untrusted Hosts: Technical Report
Confidentiality and Integrity with Untrusted Hosts: Technical Report
Stack-based typed assembly language
Journal of Functional Programming
Metacomputing with the ICET System
International Journal of High Performance Computing Applications
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Adaptive and reliable parallel computing on networks of workstations
ATEC '97 Proceedings of the annual conference on USENIX Annual Technical Conference
The logical approach to stack typing
Proceedings of the 2003 ACM SIGPLAN international workshop on Types in languages design and implementation
Automated and certified conformance to responsiveness policies
TLDI '05 Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation
ML grid programming with ConCert
Proceedings of the 2006 workshop on ML
VXA: a virtual architecture for durable compressed archives
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Free riding-aware forwarding in Content-Addressable Networks
The VLDB Journal — The International Journal on Very Large Data Bases
Foundational certified code in the Twelf metalogical framework
ACM Transactions on Computational Logic (TOCL)
Managing heterogeneity in a grid parallel haskell
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Hi-index | 0.00 |
We believe that fundamental to the establishment of a grid computing framework where all (not just large organizations) are able to effectively tap into the resources available on the global network is the establishment of trust between grid application developers and resource donors. Resource donors must be able to trust that their security, safety, and privacy policies will be respected by programs that use their systems.In this paper, we present a novel solution based on the notion of certified code that upholds safety, security, and privacy policies by examining intrinsic properties of code. Certified code complements authentication and provides a foundation for a safe, secure, and efficient framework that executes native code. We describe the implementation of such a framework known as the ConCert software.