Sciweavers

563 search results - page 35 / 113
» Verifiable Signature Sharing
Sort
View
ESOP
2009
Springer
14 years 3 months ago
A Basis for Verifying Multi-threaded Programs
Abstract. Advanced multi-threaded programs apply concurrency concepts in sophisticated ways. For instance, they use fine-grained locking to increase parallelism and change locking...
K. Rustan M. Leino, Peter Müller
PODC
2010
ACM
14 years 23 days ago
Verifying linearizability with hindsight
We present a proof of safety and linearizability of a highlyconcurrent optimistic set algorithm. The key step in our proof is the Hindsight Lemma, which allows a thread to infer t...
Peter W. O'Hearn, Noam Rinetzky, Martin T. Vechev,...
ESORICS
2009
Springer
14 years 9 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
PPOPP
2005
ACM
14 years 2 months ago
Trust but verify: monitoring remotely executing programs for progress and correctness
The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of tho...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 5 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...