[go: up one dir, main page]

Follow
Sylvan Clebsch
Sylvan Clebsch
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Deny capabilities for safe, fast actors
S Clebsch, S Drossopoulou, S Blessing, A McNeil
Proceedings of the 5th International Workshop on Programming Based on Actors …, 2015
1612015
CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ...
Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019
1022019
Toward confidential cloud computing
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Communications of the ACM 64 (6), 54-61, 2021
602021
Fully concurrent garbage collection of actors on many-core machines
S Clebsch, S Drossopoulou
Proceedings of the 2013 ACM SIGPLAN international conference on Object …, 2013
462013
Orca: GC and type system co-design for actor languages
S Clebsch, J Franco, S Drossopoulou, AM Yang, T Wrigstad, J Vitek
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017
392017
{IA-CCF}: Individual accountability for permissioned ledgers
A Shamis, P Pietzuch, B Canakci, M Castro, C Fournet, E Ashton, ...
19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022
382022
Snmalloc: a message passing allocator
P Liétar, T Butler, S Clebsch, S Drossopoulou, J Franco, MJ Parkinson, ...
Proceedings of the 2019 ACM SIGPLAN International Symposium on Memory …, 2019
352019
Confidential consortium framework: Secure multiparty applications with confidentiality, integrity, and high availability
H Howard, F Alder, E Ashton, A Chamayou, S Clebsch, M Costa, ...
arXiv preprint arXiv:2310.11559, 2023
292023
AMP: Authentication of media via provenance
P England, HS Malvar, E Horvitz, JW Stokes, C Fournet, R Burke-Aguero, ...
Proceedings of the 12th ACM Multimedia Systems Conference, 108-121, 2021
232021
Multi-stakeholder media provenance management to counter synthetic media risks in news publishing
J Aythora, R Burke-Agüero, A Chamayou, S Clebsch, M Costa, ...
Proc. Intl. Broadcasting Convention (IBC) 1 (2), 8, 2020
232020
Reference capabilities for flexible memory management
E Arvidsson, E Castegren, S Clebsch, S Drossopoulou, J Noble, ...
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1363-1393, 2023
202023
'Pony': co-designing a type system and a runtime.
S Clebsch
Imperial College London, UK, 2017
162017
Why should I trust your code?
A Delignat-Lavaud, C Fournet, K Vaswani, S Clebsch, M Riechert, ...
Communications of the ACM 67 (1), 68-76, 2023
152023
Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use
M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ...
Queue 19 (1), 49-76, 2021
142021
Tree topologies for causal message delivery
S Blessing, S Clebsch, S Drossopoulou
Proceedings of the 7th ACM SIGPLAN International Workshop on Programming …, 2017
142017
Ownership and reference counting based garbage collection in the actor world
S Clebsch, S Blessing, J Franco, S Drossopoulou
ICOOOLPS’2015, 2015
122015
When Concurrency Matters: Behaviour-Oriented Concurrency
L Cheeseman, MJ Parkinson, S Clebsch, M Kogias, S Drossopoulou, ...
Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1531-1560, 2023
112023
Why Should I Trust Your Code? Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
A Delignat-Lavaud, C Fournet, K Vaswani, S Clebsch, M Riechert, ...
Queue 21 (4), 94-122, 2023
112023
Package processing
SW CLEBSCH, MMJ BROCKSCHMIDT, SS Ishtiaq, JEC ALGLAVE, ...
US Patent 10,592,661, 2020
112020
Confidential Container Groups: Implementing confidential computing on Azure container instances
MA Johnson, S Volos, K Gordon, ST Allen, CM Wintersteiger, S Clebsch, ...
Queue 22 (2), 57-86, 2024
92024
The system can't perform the operation now. Try again later.
Articles 1–20