Sciweavers

360 search results - page 26 / 72
» ccs 2008
Sort
View
86
Voted
CONCUR
2008
Springer
14 years 12 months ago
Spatial and Behavioral Types in the Pi-Calculus
We present a framework that combines ideas from spatial logics and Igarashi and Kobayashi's behavioural type systems, drawing benefits from both. In our approach, type systems...
Lucia Acciai, Michele Boreale
CSCWD
2008
Springer
14 years 12 months ago
Running smart process based on goals
When web services are used to coalesce around the distributed applications, one prominent solution to manage and coordinate web services is the use of process management. Many res...
Zongmin Shang, Haiyang Wang, Liqiang Wang, Hui Li,...
92
Voted
CCS
2008
ACM
15 years 5 days ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
CCS
2008
ACM
15 years 5 days ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
CCS
2008
ACM
15 years 5 days ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig