Sciweavers

360 search results - page 26 / 72
» ccs 2008
Sort
View
CONCUR
2008
Springer
15 years 2 months ago
Spatial and Behavioral Types in the Pi-Calculus
We present a framework that combines ideas from spatial logics and Igarashi and Kobayashi's behavioural type systems, drawing benefits from both. In our approach, type systems...
Lucia Acciai, Michele Boreale
CSCWD
2008
Springer
15 years 2 months ago
Running smart process based on goals
When web services are used to coalesce around the distributed applications, one prominent solution to manage and coordinate web services is the use of process management. Many res...
Zongmin Shang, Haiyang Wang, Liqiang Wang, Hui Li,...
109
Voted
CCS
2008
ACM
15 years 2 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
117
Voted
CCS
2008
ACM
15 years 2 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
107
Voted
CCS
2008
ACM
15 years 2 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig