The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The broad implementation of cloud computing has brought a dramatic change to multiple industries, which derives from the development of the Internet-related technologies. This trend has enabled global enterprises to apply distributed computing techniques to reach many benefits. An effective risk management approach is required for service deliveries and a capacity planning is considered one of the...
Robust CYBersecurity information EXchange (CYBEX) infrastructure is envisioned to protect the firms from future cyber attacks via collaborative threat intelligence sharing, which might be difficult to achieve via sole effort. The executive order from the U. S. federal government clearly encourages the firms to share their cybersecurity breach and patch related information among other federal and private...
The increase of spatial data has led organizations to upload their data onto third-party service providers. Cloud computing allows data owners to outsource their databases, eliminating the need for costly storage and computational resources. The main challenge is maintaining data confidentiality with respect to untrusted parties as well as providing efficient and accurate query results to the authenticated...
Recent growth of cloud computing has driven the development of Heterogeneous Cloud Federation (HCF) that has been considered an approach of improving the diversity of cloud systems by enable cloud users to select resources provided by different service providers. Using this mechanism can divide a complicate task into a group of sub-tasks in order to increase the efficiency of application executions,...
Cloud Computing is a rapidly growing branch of distributed computing. There have been many proposed open source cloud architectures. The purpose of this paper is to look at three of the most popular open source architectures: Eucalyptus, OpenStack, and OpenNebula. These three architectures were compared by their ease of installation and performance. The benchmarks performed calculated CPU performance,...
The confidentiality and verification of customer's data at the cloud service provider (CSP) side becomes a critical issue in terms of both reliability (i.e., the trust aspect) and efficiency (i.e., the ease of performing such verifications). As data owners no longer physically possess their data storage, traditional cryptographic primitives for the purpose of data security protection cannot be directly...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
Visualization of phylogenetic trees became popular and has been widely used in biology, taxonomy, cloud computing, and bioinformatics. Different phylogenetic trees can be built based on different measures and methods. As a result, the problem became obvious when deciding which tree is better and most visually appealing. This often involves comparing two phylogenetic trees to each other. The main goal...
Monitoring and encryption are essential to secure today's computer networks. Monitoring network traffic data can be especially useful to protect against data exfiltration by detecting signatures in file metadata to identify especially sensitive files that should not be publicly released. Encryption restricts the visibility of signatures, but this may be needed because some signatures used to protect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.