Deny capabilities for safe, fast actors S Clebsch, S Drossopoulou, S Blessing, A McNeil Proceedings of the 5th International Workshop on Programming Based on Actors …, 2015 | 146 | 2015 |
CCF: A framework for building confidential verifiable replicated services M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ... Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019 | 86 | 2019 |
Toward confidential cloud computing M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ... Communications of the ACM 64 (6), 54-61, 2021 | 46 | 2021 |
Fully concurrent garbage collection of actors on many-core machines S Clebsch, S Drossopoulou Proceedings of the 2013 ACM SIGPLAN international conference on Object …, 2013 | 45 | 2013 |
Orca: GC and type system co-design for actor languages S Clebsch, J Franco, S Drossopoulou, AM Yang, T Wrigstad, J Vitek Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017 | 32 | 2017 |
Snmalloc: a message passing allocator P Liétar, T Butler, S Clebsch, S Drossopoulou, J Franco, MJ Parkinson, ... Proceedings of the 2019 ACM SIGPLAN International Symposium on Memory …, 2019 | 30 | 2019 |
{IA-CCF}: Individual accountability for permissioned ledgers A Shamis, P Pietzuch, B Canakci, M Castro, C Fournet, E Ashton, ... 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022 | 23 | 2022 |
Amp: Authentication of media via provenance P England, HS Malvar, E Horvitz, JW Stokes, C Fournet, R Burke-Aguero, ... Proceedings of the 12th ACM Multimedia Systems Conference, 108-121, 2021 | 20 | 2021 |
Multi-stakeholder media provenance management to counter synthetic media risks in news publishing J Aythora, R Burke-Agüero, A Chamayou, S Clebsch, M Costa, ... Proc. Intl. Broadcasting Convention (IBC) 1 (2), 8, 2020 | 16 | 2020 |
Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ... Queue 19 (1), 49-76, 2021 | 14 | 2021 |
Tree topologies for causal message delivery S Blessing, S Clebsch, S Drossopoulou Proceedings of the 7th ACM SIGPLAN International Workshop on Programming …, 2017 | 13 | 2017 |
'Pony': co-designing a type system and a runtime S Clebsch Imperial College London, 2017 | 12 | 2017 |
Reference capabilities for flexible memory management E Arvidsson, E Castegren, S Clebsch, S Drossopoulou, J Noble, ... Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1363-1393, 2023 | 11 | 2023 |
Ownership and reference counting based garbage collection in the actor world S Clebsch, S Blessing, J Franco, S Drossopoulou ICOOOLPS’2015, 2015 | 11 | 2015 |
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability H Howard, F Alder, E Ashton, A Chamayou, S Clebsch, M Costa, ... arXiv preprint arXiv:2310.11559, 2023 | 10 | 2023 |
Why Should I Trust Your Code? A Delignat-Lavaud, C Fournet, K Vaswani, S Clebsch, M Riechert, ... Communications of the ACM 67 (1), 68-76, 2023 | 9 | 2023 |
The pony programming language. The Pony Developers S Clebsch The Pony Developers 1, 2015 | 8 | 2015 |
Efficient transmission of data to multiple network nodes AM Lovell, S Clebsch, G Cockroft US Patent 6,633,570, 2003 | 7 | 2003 |
Roy Schuster, Alex Shamis, Olga Vrousgou, and Christoph M Wintersteiger.[nd] M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ... CCF: A Framework for Building Confidential Verifiable Replicated Services …, 0 | 7 | |
PAC: Practical accountability for CCF A Shamis, P Pietzuch, M Castro, E Ashton, A Chamayou, S Clebsch, ... arXiv preprint arXiv:2105.13116, 2021 | 6 | 2021 |