Learn More
This paper addresses the problem of how to produce reliable software that is also flexible and cost effective for the DoD distributed software domain. DoD software systems fall into two categories: information systems and war fighter systems. Both types of systems can be distributed, heterogeneous and network-based, consisting of a set of components running(More)
We consider the mean and variance of the number of en-cryptions necessary over all subsets of privileged users to revoke a set of users in the complete subtree scheme (CST) and the subset-difference scheme (SD). These are well-known tree based broadcast encryption schemes. give the mean number of encryptions for these schemes. We continue their analysis and(More)
We study the number of encryptions necessary to revoke a set of users in the complete subtree scheme (CST) and the subset-difference scheme (SD). These are well-known tree based broadcast encryption schemes. give the mean number of encryptions for these schemes. We continue their analysis and show that the limiting distribution of the number of encryptions(More)
This paper describes the distance learning Software Engineering Master's program offered at the Naval Postgraduate School and presents the lessons from its first class. The program differs from the other software engineering programs in two ways: (1) the curriculum is developed specifically to meet the needs for formal software engineering education for DoD(More)
  • 1