Sciweavers

2560 search results - page 405 / 512
» Securing VO Management
Sort
View
CN
2010
100views more  CN 2010»
15 years 4 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 4 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
ENTCS
2008
79views more  ENTCS 2008»
15 years 4 months ago
j-POST: a Java Toolchain for Property-Oriented Software Testing
Abstract. j-POST is an integrated toolchain for property-oriented software testing. This toolchain includes a test designer, a test generator, and a test execution engine. The test...
Yliès Falcone, Laurent Mounier, Jean-Claude...
IJNSEC
2008
85views more  IJNSEC 2008»
15 years 4 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
IJNSEC
2006
107views more  IJNSEC 2006»
15 years 4 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu