Sciweavers

671 search results - page 68 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
JOT
2006
80views more  JOT 2006»
15 years 1 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
COMPSAC
2005
IEEE
15 years 7 months ago
Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development
Model driven development (MDD) tackles software complexity through the use of models. However, managing relationships and specifying transformations models at various levels of ab...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Sud...
ESAS
2007
Springer
15 years 7 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
TIT
2008
187views more  TIT 2008»
15 years 27 days ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
FATES
2003
Springer
15 years 6 months ago
JMLAutoTest: A Novel Automated Testing Framework Based on JML and JUnit
Abstract. Writing specifications using Java Modeling Language has been accepted for a long time as a practical approach to increasing the correctness and quality of Java programs. ...
Guoqing Xu, Zongyuang Yang