2 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 2 / 2
Yayın Modeling and simulation support to the defense planning process(Sage Publications Inc, 2017-04-01) Çayırcı, Erdal; Özçakır, LütfüDefense planning is a crucial part of the defense process. It identifies the capabilities required for the future defense environment, analyzes the capability shortfalls, prioritizes them, and provides the fundamental inputs for their development. Modeling and simulation may significantly contribute to the success of defense planning. However, neither the theory nor the tools are mature enough to fulfill the defense planning requirements. Various types of simulation tools, such as static, dynamic, deterministic, stochastic, closed, discrete, continuous, and symbiotic, in multiple levels of resolution and fidelity are needed to support the different stages and phases. The verification and validation of the models and the analysis of the input and output data are critical. Yet another challenge is that the uncertainties related to the contemporary defense scenarios are mostly not in aleatory but in the epistemic domain. In this paper, we briefly present a new computer-assisted defense planning process. Then, we introduce the service-oriented cloud approach for the modeling and simulation support to the process.Yayın A hierarchical key assignment scheme: a unified approach for ccalability and efficiency(IEEE, 2024-05-24) Çelikbilek, İbrahim; Çeliktaş, Barış; Özdemir, EnverThis study introduces a hierarchical key assignment scheme (HKAS) based on the closest vector problem in an inner product space (CVP-IPS). The proposed scheme offers a comprehensive solution with scalability, flexibility, cost-effectiveness, and high performance. The key features of the scheme include CVP-IPS based construction, the utilization of two public keys by the scheme, a distinct basis set designated for each class, a direct access scheme to enhance user convenience, and a rigorous mathematical and algorithmic presentation of all processes. This scheme eliminates the need for top-down structures and offers a significant benefit in that the lengths of the basis sets defined for classes are the same and the costs associated with key derivation are the same for all classes, unlike top-down approaches, where the higher class in the hierarchy generally incurs much higher costs. The scheme excels in both vertical and horizontal scalability due to its utilization of the access graph and is formally proven to achieve strong key indistinguishability security (S-KI-security). This research represents a significant advancement in HKAS systems, providing tangible benefits and improved security for a wide range of use cases.












