Learn More
Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted security code controls the release of that data. As applied to(More)
Based on developmental biology's Rule of Normal Neighbors, we develop a new mechanism for spatial patterning, exhibiting spontaneous symmetry breaking, regeneration, and approximate scale invariance. The desired pattern is represented as a topological adjacency graph, yielding an energy function that cells minimize through local interactions. Combined with(More)
Today's Web depends on a particular pact between sites and users: sites invest capital and labor to create and market a set of features, and users gain access to these features by giving up control of their data (photos, personal information, creative musings, etc.). This paper imagines a very different Web ecosystem, in which users retain control of their(More)
  • Arvind Thiagarajan, Hari Balakrishnan, Emil Sit, Mike Walfish, Mythili Vutukuru, Lenin Ravindranath +24 others
  • 2011
This dissertation is concerned with the problem of determining the track or trajectory of a mobile device — for example, a sequence of road segments on an outdoor map, or a sequence of rooms visited inside a building — in an energy-efficient and accurate manner. GPS, the dominant positioning technology today, has two major limitations. First, it consumes(More)
We present a secure service prototype built from untrusted, contributed code. The service manages private data for a variety of different users, and user programs frequently require access to other users' private data. However, aside from covert timing channels, no part of the service can corrupt private data or leak it between users or outside the system(More)
  • Maxwell Norman Krohn, Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M Frans Kaashoek +27 others
  • 2008
Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on the off-the-shelf software that runs the site (e.g., the operating system, the application libraries, the Web server, etc.), but more(More)
How might organisms grow into their desired physical forms in spite of environmental and genetic variation? How do they maintain this form in spite of physical insults? This article presents a case study in simulated morphogenesis, using a physics-based model for embryonic epithelial tissue. The challenges of the underlying physics force the introduction of(More)
  • Jeremy Andrew Stribling, Larry Peterson, Marc Fiuczynski, Sapan Bhatia, Daniel Hokka Zakrisson, Faiyaz Ahmed +40 others
  • 2009
There is a growing set of Internet-based services that are too big, or too important, to run at a single site. Examples include Web services for e-mail, video and image hosting, and social networking. Splitting such services over multiple sites can increase capacity, improve fault tolerance, and reduce network delays to clients. These services often need(More)