Följ
Sylvan Clebsch
Sylvan Clebsch
Microsoft Research
Verifierad e-postadress på microsoft.com
Titel
Citeras av
Citeras av
År
Deny capabilities for safe, fast actors
S Clebsch, S Drossopoulou, S Blessing, A McNeil
Proceedings of the 5th International Workshop on Programming Based on Actors …, 2015
1462015
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019
862019
Toward confidential cloud computing
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Communications of the ACM 64 (6), 54-61, 2021
462021
Fully concurrent garbage collection of actors on many-core machines
S Clebsch, S Drossopoulou
Proceedings of the 2013 ACM SIGPLAN international conference on Object …, 2013
452013
Orca: GC and type system co-design for actor languages
S Clebsch, J Franco, S Drossopoulou, AM Yang, T Wrigstad, J Vitek
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
322017
Snmalloc: a message passing allocator
P Liétar, T Butler, S Clebsch, S Drossopoulou, J Franco, MJ Parkinson, ...
Proceedings of the 2019 ACM SIGPLAN International Symposium on Memory …, 2019
302019
{IA-CCF}: Individual accountability for permissioned ledgers
A Shamis, P Pietzuch, B Canakci, M Castro, C Fournet, E Ashton, ...
19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022
232022
Amp: Authentication of media via provenance
P England, HS Malvar, E Horvitz, JW Stokes, C Fournet, R Burke-Aguero, ...
Proceedings of the 12th ACM Multimedia Systems Conference, 108-121, 2021
202021
Multi-stakeholder media provenance management to counter synthetic media risks in news publishing
J Aythora, R Burke-Agüero, A Chamayou, S Clebsch, M Costa, ...
Proc. Intl. Broadcasting Convention (IBC) 1 (2), 8, 2020
162020
Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Queue 19 (1), 49-76, 2021
142021
Tree topologies for causal message delivery
S Blessing, S Clebsch, S Drossopoulou
Proceedings of the 7th ACM SIGPLAN International Workshop on Programming …, 2017
132017
'Pony': co-designing a type system and a runtime
S Clebsch
Imperial College London, 2017
122017
Reference capabilities for flexible memory management
E Arvidsson, E Castegren, S Clebsch, S Drossopoulou, J Noble, ...
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1363-1393, 2023
112023
Ownership and reference counting based garbage collection in the actor world
S Clebsch, S Blessing, J Franco, S Drossopoulou
ICOOOLPS’2015, 2015
112015
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability
H Howard, F Alder, E Ashton, A Chamayou, S Clebsch, M Costa, ...
arXiv preprint arXiv:2310.11559, 2023
102023
Why Should I Trust Your Code?
A Delignat-Lavaud, C Fournet, K Vaswani, S Clebsch, M Riechert, ...
Communications of the ACM 67 (1), 68-76, 2023
92023
The pony programming language. The Pony Developers
S Clebsch
The Pony Developers 1, 2015
82015
Efficient transmission of data to multiple network nodes
AM Lovell, S Clebsch, G Cockroft
US Patent 6,633,570, 2003
72003
Roy Schuster, Alex Shamis, Olga Vrousgou, and Christoph M Wintersteiger.[nd]
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
CCF: A Framework for Building Confidential Verifiable Replicated Services …, 0
7
PAC: Practical accountability for CCF
A Shamis, P Pietzuch, M Castro, E Ashton, A Chamayou, S Clebsch, ...
arXiv preprint arXiv:2105.13116, 2021
62021
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20