The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motivated by the growing convergence of diverse types of networks and the raise of new concepts such as Future Internet (FI), in this paper we present an analysis of current research on the development of security mechanisms in a tradeoff with Quality of Service (QoS) mechanisms. More precisely, we pay attention to the Security and QoS problems in resource-constrained networks that are candidates...
In recent years, the number of web services has proliferated; consequently the number of web services that offer the same services have been increased. The differences between same web services are quality parameters. Quality of service in web services consists of various non-functional factors such as execution cost, execution time, availability, successful execution rate, and security. Also clients...
Cloud Computing is an emerging computing paradigm. It shares massively scalable, elastic resources (e.g., data, calculations, and services) transparently among the users over a massive network. The Cloud market is growing rapidly and bringing up numerous research challenges. This paper provides a landscape of Cloud Computing and its research challenges, especially considering the areas of service...
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality...
With the use of geographic information services widely, geographic information quality of service (QoS) has become one of the key factors for the success of geographic information service applications. However, how to estimate Geographic Information Service QoS reasonably is a complex issue. Based on the analysis of the current research results of geographic information QoS, this paper firstly summarized...
The wireless technologies and specifically multi-hop wireless mesh networks (WMN) based on heterogeneous infrastructures emerged as an important solution for Broadband Wireless Access (BWA). The WMN integration in end to end architecture, especially in the perspective of Future Internet needs a careful definition of system requirements seen from several perspectives. This paper proposes a systematic...
Security is an important QoS attribute for characterizing intrusion tolerant systems. In order to evaluate security performance of an intrusion tolerant system more effectively and directly, quantifying its security is inevitable. From the view of practical application, this paper provides a novel quantifying method. The security of intrusion tolerant systems is quantified to three explicit attributes...
In the real world a service in a business is usually composed of many component services. These component services join together to form a composite of components. The trustworthiness of component services determines the trustworthiness of this composite. This trustworthiness of composite service has a large impact on the successful delivery of a service. In this paper we study that how we can determine...
Web services have widely employed in many application fields. The loosely coupled and distributed characters of Web services also incur trustworthiness problem. Quality of service, reputation and security all can be taken into account for trustworthy Web services. The three aspects affect each other. In this paper, we propose concept of trustworthy Web services, and design an extend Web service model...
When a number of Web services are deployed there may be many Web services can provide expected functions of a service request. QoS can be then used to distinguish those similar functional services in order to select the best services in terms of their quality. Various QoS models and QoS languages have been proposed for Web services. Therefore different organizations and companies may adopt different...
The goal of service oriented architectures (SOAs) is to enable the creation of business applications through the automatic discovery and composition of independently developed and deployed (Web) services. Automatic discovery of Web services (WSs) can be achieved by incorporating semantics into a richer WS description model (WSDM) and by the use of semantic Web (SW) technologies in the WS matchmaking...
As the importance of service's continuity for service-oriented computing (SOC) system and present QoS assurance mechanisms in SOC system did not take full account of the impact of the service components dynamics. In order to solve this problem credit model and credit function was put forward, CRD (credit record data) is used to quantize the SOC system's dynamic. A new QoS assurance mechanism which...
With the proliferation of Web services as a business solution to enterprise application integration, ranking and selecting the best Web services among the providers become an important factor in the success of the business solution. Quality of service (QoS) determines the quality and usability of a service including its price, performance, reliability, integrity, accessibility, availability, interoperability,...
Wireless sensor networks are increasingly being used in applications where QoS and low cost are the overriding considerations. Conventional schemes of using sensor nodes and incorporating these three phenomena (reliability, availability and serviceability) to attain QoS can effectively improve not only the reliability of the overall WSNs but security as well. We discuss the reverse look of QoS and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.