نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

2003
Ricardo Neisse Lisandro Zambenedetti Granville Diego Osório Ballvé Maria Janilce Bosquiroli Almeida Liane Margarida Rockenbach Tarouco

Some proposals in the network management area use XML to encode the information model and the managed variables instances. In this paper we present an SNMP to XML dynamic proxy implementation to translate the information retrieved from network devices using SNMP to an XML representation. The proxy developed use the translation support between information models found in the libsmi and a SAX par...

Journal: :IACR Cryptology ePrint Archive 2011
Jian Weng Yunlei Zhao

In this work, we study (the direct constructions of) bidirectional proxy re-encryption (PRE) with alleviated trust in the proxy, specifically the master secret security (MSS) and the nontransitivity (NT) security, in the standard model, and achieve the following: • A multi-hop MSS-secure bidirectional PRE scheme with security against chosen plaintext attacks (CPA) in the standard model, where t...

2010
Chul Sur Chae Duk Jung Youngho Park Kyung Hyune Rhee

In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes. We present a concrete scheme based on bilinear pairing, which enjoys the advantages of certificateless public key cryptography while providing the functionalities of proxy re-encryption. Moreover, the proposed scheme is unidirecti...

Journal: Iranian Economic Review 2020

F orecasting the volatility of a financial asset has wide implications in finance. Conditional variance extracted from the GARCH framework could be a suitable proxy of financial asset volatility. Option pricing, portfolio optimization, and risk management are examples of implications of conditional variance forecasting. One of the most recent methods of volatility forecasting is Real...

1995
Karim R. Mazouni Rachid Guerraoui

Invocation is the communication paradigm of objects. It is asymmetric by deenition: the invoker initiates the invocation whereas the invokee reacts to it. A proxy is a local representative of the invokee on the invoker's machine. Like the invocation, the proxy notion is asymmetric. However, when replicated objects are considered, there is a need for symmetric proxies: a regular proxy plus an in...

Efficient market hypothesis predicts that capital markets are beset with cer-tain biases which result from wrong estimation, and negatively influence shareholders’ expectations for higher returns, which in turn affects invest-ment efficiency, financial constraints and corporate performance efficacy in competitive markets, and eventually mitigates firm value. The present study aims at examining ...

2018
Oliver Braganza

In many areas of society we rely on competition to better achieve societal goals. Ideally, competition motivates effort and efficiently allocates resources. However, due to imperfect information, competition generally depends on quantitative proxy measures in order to assess performance. This leads to an increasing use of such quantitative proxies in modern societies. Examples include: in scien...

2013
Sébastien Salva

This paper proposes a model-based testing approach which combines two monitoring methods, runtime verification and passive testing. Starting from ioSTS (input output Symbolic Transition System) models, this approach generates monitors to check whether an implementation is ioco-conforming to its specification and meets safety properties. This paper also tackles the trace extraction problem by re...

2013
Christian Hanser Daniel Slamanig

Proxy signatures allow an entity (the delegator) to delegate his signing capabilities to other entities (called proxies), who can then produce signatures on behalf of the delegator. Typically, a delegator may not want to give a proxy the power to sign any message on his behalf, but only messages from a well defined message space. Therefore, the so called delegation by warrant approach has been ...

2002
Ju Wang Andrew A. Chien

Proxy networks based on overlays have been proposed as an architecture to protect Internet applications against denial-of-service attacks, however we know of no formal analysis of such schemes' effectiveness. We describe a framework to analyze a class of these proxy network architectures. Based on an attack model and a system model, we analytically characterize how attacks affect two key factor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید