Sciweavers

2261 search results - page 36 / 453
» Dynamic types for authentication
Sort
View
ENTCS
2008
83views more  ENTCS 2008»
13 years 8 months ago
Dynamic Translucency with Abstraction Kinds and Higher-Order Coercions
traction Kinds and Higher-Order Coercions Andreas Rossberg1 Max Planck Institute for Software Systems Saarbr
Andreas Rossberg
FOSSACS
2001
Springer
14 years 1 months ago
High-Level Petri Nets as Type Theories in the Join Calculus
Abstract. We study the expressiveness of the join calculus by comparison with (generalised, coloured) Petri nets and using tools from type theory. More precisely, we consider four ...
Maria Grazia Buscemi, Vladimiro Sassone
FMOODS
2006
13 years 10 months ago
Type-Safe Runtime Class Upgrades in Creol
Modern applications distributed across networks such as the Internet may need to evolve without compromising application availability. Object systems are well suited for runtime up...
Ingrid Chieh Yu, Einar Broch Johnsen, Olaf Owe
IACR
2011
128views more  IACR 2011»
12 years 8 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
ECOOP
1999
Springer
14 years 1 months ago
Type-Safe Delegation for Run-Time Component Adaptation
Abstract. The aim of component technology is the replacement of large monolithic applications with sets of smaller software components, whose particular functionality and interoper...
Günter Kniesel