Research for Practice

Volume 14, Issue 2 - March/April 2016

Baumann et al. Shielding applications from an untrusted cloud with Haven (OSDI 2014)
https://www.usenix.org/conference/osdi14/technical-sessions/presentation/baumann

Belay et al. IX: A Protected Dataplane Operating System for High Throughput and Low Latency (OSDI 2014)
https://www.usenix.org/conference/osdi14/technical-sessions/presentation/belay

Carpenter & Brim. Middleboxes: Taxonomy and Issues. RFC 3234, February 2002.
https://tools.ietf.org/html/rfc3234

Clements et al. The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors (SOSP 2013)
http://dl.acm.org/authorize?N00524

Naylor et al. Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS. ACM SIGCOMM, 2015.
http://dl.acm.org/authorize?N00522

Palkar, Lan, et al. E2: A framework for NFV Applications. ACM Symposium on Operating Systems Principles, 2015.
http://dl.acm.org/citation.cfm?id=2815423

Peter et al. Arrakis: The operating system is the control plane (OSDI 2014)
https://www.usenix.org/conference/osdi14/technical-sessions/presentation/peter

Sherry et al. BlindBox: Deep Packet Inspection over Encrypted Traffic. ACM SIGCOMM, 2015.
http://dl.acm.org/authorize?N00523