Baumann et al. Shielding applications from an untrusted cloud with Haven (OSDI 2014)
https://www.usenix.org/conference/osdi14/technical-sessions/presentation/baumann
Belay et al. IX: A Protected Dataplane Operating System for High Throughput and Low Latency (OSDI 2014)
https://www.usenix.org/conference/osdi14/technical-sessions/presentation/belay
Carpenter & Brim. Middleboxes: Taxonomy and Issues. RFC 3234, February 2002.
https://tools.ietf.org/html/rfc3234
Clements et al. The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors (SOSP 2013)
http://dl.acm.org/authorize?N00524
Naylor et al. Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS. ACM SIGCOMM, 2015.
http://dl.acm.org/authorize?N00522
Palkar, Lan, et al. E2: A framework for NFV Applications. ACM Symposium on Operating Systems Principles, 2015.
http://dl.acm.org/citation.cfm?id=2815423
Peter et al. Arrakis: The operating system is the control plane (OSDI 2014)
https://www.usenix.org/conference/osdi14/technical-sessions/presentation/peter
Sherry et al. BlindBox: Deep Packet Inspection over Encrypted Traffic. ACM SIGCOMM, 2015.
http://dl.acm.org/authorize?N00523
© 2016 ACM, Inc. All Rights Reserved.