Sciweavers

880 search results - page 62 / 176
» Semantics-Based Concurrency Control
Sort
View
EUROCRYPT
2001
Springer
14 years 1 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
SIGCSE
2008
ACM
92views Education» more  SIGCSE 2008»
13 years 8 months ago
Patterns for programming in parallel, pedagogically
Pipeline, Delta, and Black Hole are three simple patterns used in concurrent software design. We recently presented these and other patterns for parallelism at a nine-hour worksho...
Matthew C. Jadud, Jon Simpson, Christian L. Jacobs...
ANCS
2009
ACM
13 years 6 months ago
A lock-free, cache-efficient shared ring buffer for multi-core architectures
We propose MCRingBuffer, a lock-free, cache-efficient shared ring buffer that provides fast data accesses among threads running in multi-core architectures. MCRingBuffer seeks to ...
Patrick P. C. Lee, Tian Bu, Girish P. Chandranmeno...
CIDR
2011
221views Algorithms» more  CIDR 2011»
13 years 14 days ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...
POLICY
2009
Springer
14 years 3 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...