Sciweavers

403 search results - page 50 / 81
» An algebra for commitment protocols
Sort
View
ACNS
2007
Springer
96views Cryptology» more  ACNS 2007»
15 years 3 months ago
Universal Accumulators with Efficient Nonmembership Proofs
Based on the notion of accumulators, we propose a new cryptographic scheme called universal accumulators. This scheme enables one to commit to a set of values using a short accumul...
Jiangtao Li, Ninghui Li, Rui Xue
RTDB
1996
131views more  RTDB 1996»
15 years 1 months ago
Value-cognizant Admission Control Strategies for Real-Time DBMS
We propose and evaluate an admission control paradigm for RTDBS, in which a transaction is submitted to the system as a pair of processes: a primary task, and a recovery block. Th...
Azer Bestavros, Sue Nagy
DPD
2002
100views more  DPD 2002»
14 years 11 months ago
Light-Weight Currency Management Mechanisms in Mobile and Weakly-Connected Environments
This paper discusses the currency management mechanisms used in Deno, a replicated object storage system designed for use in mobile and weakly-connected environments. Deno primari...
Ugur Çetintemel, Peter J. Keleher
ICWS
2009
IEEE
14 years 9 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
FROCOS
2000
Springer
15 years 3 months ago
Non-Trivial Symbolic Computations in Proof Planning
Abstract. We discuss a pragmatic approach to integrate computer algebra into proof planning. It is based on the idea to separate computation and veri cation and can thereby exploit...
Volker Sorge