Sciweavers

3053 search results - page 245 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
136
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
15 years 7 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...
125
Voted
IEEEINTERACT
2003
IEEE
15 years 7 months ago
A Region-Based Compilation Infrastructure
: The traditional framework for back-end compilation is based on the scope of functions, which is a natural boundary to partition an entire program for compilation. However, the si...
Yang Liu, Zhaoqing Zhang, Ruliang Qiao, Roy Dz-Chi...
CISIS
2010
IEEE
15 years 7 months ago
Shared Data Grid Programming Improvements Using Specialized Objects
- The shared data programming model is an attractive grid programming alternative to message passing solutions. This paper addresses type related improvements to a shared data grid...
Dacian Tudor, Georgiana Macariu, Wolfgang Schreine...
122
Voted
IFIP
2004
Springer
15 years 7 months ago
New-HOPLA: A Higher-order Process Language with Name Generation
Abstract This paper introduces new-HOPLA, a concise but powerful language for higherorder nondeterministic processes with name generation. Its origins as a metalanguage for domain ...
Glynn Winskel, Francesco Zappa Nardelli