Sciweavers

201 search results - page 18 / 41
» Tools to Support Secure Enterprise Computing
Sort
View
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 11 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
ESORICS
2010
Springer
13 years 9 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
EDOC
2007
IEEE
14 years 2 months ago
Survey of Traceability Approaches in Model-Driven Engineering
Models have been used in various engineering fields to help managing complexity and represent information in difbstraction levels, according to specific notations and stakeholde...
Ismênia Galvão, Arda Goknil
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
13 years 8 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
BMCBI
2011
13 years 3 months ago
LabKey Server: An open source platform for scientific data integration, analysis and collaboration
Background: Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia t...
Elizabeth K. Nelson, Britt Piehler, Josh Eckels, A...