Sciweavers

718 search results - page 36 / 144
» Operational Semantics of Security Protocols
Sort
View
OOPSLA
1989
Springer
13 years 12 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
WS
2003
ACM
14 years 1 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
HOTOS
2009
IEEE
13 years 11 months ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
JFP
2010
142views more  JFP 2010»
13 years 6 months ago
Linear type theory for asynchronous session types
Session types support a type-theoretic formulation of structured patterns of communication, so that the communication behaviour of agents in a distributed system can be verified ...
Simon J. Gay, Vasco Thudichum Vasconcelos
ECOOPW
1998
Springer
14 years 1 days ago
Secure Recording of Itineraries through Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and o...
Volker Roth