default search action
David M. Eyers
- > Home > Persons > David M. Eyers
Publications
- 2023
- [c92]Vasily A. Sartakov, Lluís Vilanova, Munir Geden, David M. Eyers, Takahiro Shinagawa, Peter R. Pietzuch:
ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities. OSDI 2023: 573-587 - 2022
- [c89]Vasily A. Sartakov, Lluís Vilanova, David M. Eyers, Takahiro Shinagawa, Peter R. Pietzuch:
CAP-VMs: Capability-Based Isolation and Sharing in the Cloud. OSDI 2022: 597-612 - [i8]Vasily A. Sartakov, Lluís Vilanova, David M. Eyers, Takahiro Shinagawa, Peter R. Pietzuch:
CAP-VMs: Capability-Based Isolation and Sharing for Microservices. CoRR abs/2202.05732 (2022) - 2021
- [c87]Vasily A. Sartakov, Daniel O'Keeffe, David M. Eyers, Lluís Vilanova, Peter R. Pietzuch:
Spons & Shields: practical isolation for trusted execution. VEE 2021: 186-200 - 2018
- [c78]Pierre-Louis Aublin, Florian Kelbert, Dan O'Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David M. Eyers, Peter R. Pietzuch:
LibSEAL: revealing service integrity violations using trusted execution. EuroSys 2018: 24:1-24:15 - 2017
- [c73]Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David M. Eyers, Rüdiger Kapitza, Christof Fetzer, Peter R. Pietzuch:
Glamdring: Automatic Application Partitioning for Intel SGX. USENIX ATC 2017: 285-298 - 2016
- [c64]Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, André Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark Stillwell, David Goltzsche, David M. Eyers, Rüdiger Kapitza, Peter R. Pietzuch, Christof Fetzer:
SCONE: Secure Linux Containers with Intel SGX. OSDI 2016: 689-703 - 2015
- [c60]Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch:
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications. CCS 2015: 603-615 - 2014
- [j7]Jean Bacon, David M. Eyers, Thomas F. J.-M. Pasquier, Jatinder Singh, Ioannis Papagiannis, Peter R. Pietzuch:
Information Flow Control for Secure Cloud Computing. IEEE Trans. Netw. Serv. Manag. 11(1): 76-89 (2014) - [c54]Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, David M. Eyers, Brian Shand, Rüdiger Kapitza, Peter R. Pietzuch:
CloudSafetyNet: Detecting Data Leakage between Cloud Tenants. CCSW 2014: 117-128 - [c48]Sebastian Frischbier, Erman Turan, Michael Gesmann, Alessandro Margara, David M. Eyers, Patrick Th. Eugster, Peter R. Pietzuch, Alejandro P. Buchmann:
Effective Runtime Monitoring of Distributed Event-Based Enterprise Systems with ASIA. SOCA 2014: 41-48 - 2013
- [c47]Sebastian Frischbier, Alessandro Margara, Tobias Freudenreich, Patrick Eugster, David M. Eyers, Peter R. Pietzuch:
Aggregation for implicit invocations. AOSD 2013: 109-120 - 2012
- [c38]David M. Eyers, Tobias Freudenreich, Alessandro Margara, Sebastian Frischbier, Peter R. Pietzuch, Patrick Eugster:
Living in the present: on-the-fly information processing in scalable web architectures. CloudCP@EuroSys 2012: 6:1-6:6 - 2011
- [j6]David M. Eyers, Ramani Routray, Rui Zhang, Douglas Willcocks, Peter R. Pietzuch:
Configuring large-scale storage using a middleware with machine learning. Concurr. Comput. Pract. Exp. 23(17): 2063-2077 (2011) - [c36]Rui Zhang, Ramani Routray, David M. Eyers, David D. Chambliss, Prasenjit Sarkar, Douglas Willcocks, Peter R. Pietzuch:
IO Tetris: Deep Storage Consolidation for the Cloud via Fine-Grained Workload Analysis. IEEE CLOUD 2011: 700-707 - [c34]Petr Hosek, Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, David Evans, Brian Shand, Jean Bacon, Peter R. Pietzuch:
SafeWeb: A Middleware for Securing Ruby-Based Web Applications. Middleware 2011: 491-511 - 2010
- [c31]Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand:
Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper). Middleware 2010: 293-312 - [c30]Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
Distributed Middleware Enforcement of Event Flow Security Policy. Middleware 2010: 334-354 - [c29]Ramani Routray, Rui Zhang, David M. Eyers, Douglas Willcocks, Peter R. Pietzuch, Prasenjit Sarkar:
Policy Generation Framework for Large-Scale Storage Infrastructures. POLICY 2010: 65-72 - [c26]Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
DEFCON: High-Performance Event Processing with Information Security. USENIX ATC 2010 - 2009
- [j3]Jean Bacon, David M. Eyers, Jatinder Singh, Brian Shand, Matteo Migliavacca, Peter R. Pietzuch:
Security in Multi-domain Event-based Systems (Sicherheit in ereignis-basierten Mehrdomänensystemen). it Inf. Technol. 51(5): 277-284 (2009) - [c25]Ioannis Papagiannis, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand, David M. Eyers, Jean Bacon:
PrivateFlow: decentralised information flow control in event based middleware. DEBS 2009 - [c24]David M. Eyers, Ramani Routray, Rui Zhang, Douglas Willcocks, Peter R. Pietzuch:
Towards a middleware for configuring large-scale storage infrastructures. MGC@Middleware 2009: 3 - [c23]David M. Eyers, Ben Roberts, Jean Bacon, Ioannis Papagiannis, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand:
Event-processing middleware with information flow control. Middleware (Companion) 2009: 32 - 2008
- [c22]Jean Bacon, David M. Eyers, Jatinder Singh, Peter R. Pietzuch:
Access control in publish/subscribe systems. DEBS 2008: 23-34 - 2007
- [c15]Peter R. Pietzuch, David M. Eyers, Samuel Kounev, Brian Shand:
Towards a common API for publish/subscribe. DEBS 2007: 152-157 - 2003
- [c8]András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody:
Role-based access control for publish/subscribe middleware architectures. DEBS 2003
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint