Java's insecure parallelism
نویسندگان
چکیده
منابع مشابه
Logics for Insecure Communication
We present a general setting for dynarnlc-epistemic logics for communication, which can express announcements of different types (public or private, truthful or not, reliable or not, secure or not etc.), queries of the corresponding types, complex dialogues, dialogue games, strategies (protocols) for communication etc. We analyze some examples, we discuss various properties of dialogues (normal...
متن کاملDerivational Parallelism and Ellipsis Parallelism
A central topic in work on ellipsis is the parallelism between missing VPs and their antecedents. There is evidence that parallelism is conditioned both syntactically and semantically. This has resulted in complex hybrid principles that regulate both syntactic structures and their interpretations (e.g., Fox 1995, 2000). We present an alternative, unified account based on parallelism of semantic...
متن کاملSecure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user’s desktop may now consist of many smaller components that interact in intricate ways. Some components will be downloaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g. that persona...
متن کاملInsecure "Provable Secure Network Coding"
Network coding allows the routers to mix the received information before forwarding them to the next nodes. Though this information mixing has been proven to maximize network throughput, it also introduces security challenges such as pollution attacks. A malicious node could insert a malicious packet into the system and this corrupted packet will propagate more quickly than in traditional copy-...
متن کاملHardware parallelism vs. software parallelism
In this paper, we explore the rationale for multicore parallelism and instead argue that a better use of transistors is to use reconfigurable hardware cores. The difficulty in achieving software parallelism means that new ways of exploiting the silicon real estate need to be explored. Hardware implementations can often expose much finer grained parallelism than possible with software implementa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGPLAN Notices
سال: 1999
ISSN: 0362-1340,1558-1160
DOI: 10.1145/312009.312034