Sciweavers

880 search results - page 62 / 176
» Semantics-Based Concurrency Control
Sort
View
EUROCRYPT
2001
Springer
15 years 6 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
94
Voted
SIGCSE
2008
ACM
92views Education» more  SIGCSE 2008»
15 years 2 months ago
Patterns for programming in parallel, pedagogically
Pipeline, Delta, and Black Hole are three simple patterns used in concurrent software design. We recently presented these and other patterns for parallelism at a nine-hour worksho...
Matthew C. Jadud, Jon Simpson, Christian L. Jacobs...
ANCS
2009
ACM
15 years 7 days ago
A lock-free, cache-efficient shared ring buffer for multi-core architectures
We propose MCRingBuffer, a lock-free, cache-efficient shared ring buffer that provides fast data accesses among threads running in multi-core architectures. MCRingBuffer seeks to ...
Patrick P. C. Lee, Tian Bu, Girish P. Chandranmeno...
159
Voted
CIDR
2011
221views Algorithms» more  CIDR 2011»
14 years 6 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...
119
Voted
POLICY
2009
Springer
15 years 9 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...