Programming Methodology Group publications by David Schultz

Also see all authors, all publications by date, all publications by topic.

Copyright notice.


“IFDB: Decentralized Information Flow Control for Databases”
by David Schultz and Barbara Liskov.
In Proceedings of the 8th ACM European Conference on Computer Systems, (Prague, Czech Republic), Apr. 2013.
Details. Download: pdf.

“Decentralized Information Flow Control for Databases”
by David Schultz.
Ph.D. dissertation, MIT, July 2012.
Details. Download: pdf.

“Abstractions for Usable Information Flow Control in Aeolus”
by Winnie Cheng, Dan R. K. Ports, David Schultz, Victoria Popic, Aaron Blankstein, James Cowling, Dorothy Curtis, Liuba Shrira, and Barbara Liskov.
In Proceedings of the 2012 USENIX Annual Technical Conference, (Boston, MA, USA), June 2012.
Details. Download: pdf.

“Automatic Reconfiguration for Large-Scale Reliable Storage Systems”
by Rodrigo Rodrigues, Barbara Liskov, Kathryn Chen, Moses Liskov, and David Schultz.
IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, Mar. 2012, pp. 146-158.
Details. Download: pdf.

MPSS: Mobile Proactive Secret Sharing
by David Schultz, Barbara Liskov, and Moses Liskov.
ACM Transactions on Information and System Security (TISSEC), vol. 13, Dec. 2010, ACM.
Details. Download: pdf.

“Mobile Proactive Secret Sharing”
by David Schultz, Barbara Liskov, and Moses Liskov.
In Twenty-Seventh Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), Aug. 2008. Brief Announcement.
Details. Download: ps, pdf.

“Mobile Proactive Secret Sharing”
by David Schultz.
Masters thesis, MIT, Jan. 2007.
Details. Download: ps, pdf.


Copyright notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

This page was generated Tue Apr 9 20:09:28 2019 by bibtex2web

Programming Methodology Group