The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The concept of Internet of Things (IoT) which lately was perceived as emerging paradigm is now becoming an important field for innovation-based companies who are developing and deploying solutions tailored to their clients' needs. Despite the fact that there were numerous IoT models which were proposed in research papers, many of them were lacking practical architecture examples and empirical studies...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly...
Patterns abstract good practices to define basic models that can be used to build new systems and evaluate existing systems. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system requirements, design, and evaluation. We built a catalog of over 100 security patterns, which is still growing. We complement...
The last decade has witnessed a huge number of innovations and new technologies which have impacted our routines and have simplified our lives. Higher Education is an exception to this scenario and still in its nascent stage when it comes to technology adoption and collaboration. This paper attempts to figure out the reasons and suggest remedial measures. The world around us is moving so fast and...
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. There is a vital need to define the basic information/semantic models, architecture components and operational models that together comprise a socalled Big Data Ecosystem. This paper discusses a nature of Big Data that may originate from different...
Cloud Computing has transformed the software support for large systems from server to service oriented paradigm. This drift has evolved new challenges for design and delivery of services over heterogeneous requirements and environments. This brings about risks and challenges for systems. The system over internet are vulnerable to performance and security risks. The performance is a composite evaluation...
As Cloud Computing continues to evolve the majority of research tends to lean towards optimising, securing and improving Cloud technologies. Less work appears which leverages the architectural and economic advantages of the Cloud. This paper examines the Cloud as a security testing environment, having a number of purposes such as penetration testing, and the dynamic creation and testing of environments...
With a very wide variety of potential applications, the market for Machine-to-Machine (M2M) connectivity - sometimes referred to as Embedded Mobile (EM) - is one of the main growth areas in telecommunications and associated vertical industries. There are several major differences between the embedded domain and traditional subscriber-centric mobile communications. Chief among these is the way in which...
In recent years, the research to the Grid economy has become a hot spot with the development of Grid technology. Some models and middleware have been proposed to improve the application of Grid economy. One remarkable result of these is the Grid Architecture for Computational Economy (GRACE) which contains the functionality of resource discovery, resource trade and resource allocation. However, in...
With the growing number of botnet attacks, the botnet detection is becoming increasingly important for the network security. To enhance the existing botnet detection systems which are short of efficient information collection functions, this paper presents a collaborative information collection model with a new 5-tuple structural mode. In the model, we introduce the static and dynamic roles to meet...
Based upon the analysis of management system for reserve talents of Volleyball Athletes and in accordance with the software engineering requirements, the management system for reserve talents of Volleyball Athletes is designed and developed. The system integrates the basic information, evaluation, statistics and decision-making models, and various kinds of athletic competency models of elite athletes,...
This thesis puts forward an innovative model of health management service grid, and gives the overall architecture of health management grid platform system by which a health management service model can be established based on the analysis of present condition of health management in China. This paper also presents a new integrated model about the health management service resources by using the...
The development of industry informationization and electronic commerce (e-commerce) promote the emergence of electronic market (e-market). One called electronic exchange (e-exchange) is a typical business model. It requires a higher security level for the business operating system. This paper systematically studies the e-exchange security problems from the view of e-commerce security, analyzes the...
From the network birth to the vigorous development, as well as many concomitant security problems, all symbolized the network developing process approaches the ecological organization evolution process. But today's tradition network security defense architecture is exposing the mechanical and stiff malpractice gradually, which is unable to deal with a variety of the security threats that are latent...
Grid applications must provide exceptional quality of service but because of the complexity and diversity of grid environment, the quality of service (QoS) can not be guaranteed. In order to solve the problem of quality of service in grid, QoS mechanisms must be introduced, that is, the QoS parameters of the problem description. At present, there are a lot of QoS researches, but very little research...
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enhanced security policies does not necessarily establish the mutual trust relationship ultimately, and even has a negative effect on the usability and acceptability of DRM system. Therefore,...
Traditional e-business focuses on physical products trading, and although there are transactions of the so called "virtual products", its scope is limited to "downloadable files" or game card points. But in offline market, services & intellectual works forms an important part in all commercial fields. By reconstructing the concept of "intangible product" in e-business...
To meet the requirements in developing distributed simulation technology, a grid-based distributed simulation platform (GDSP), which was based on latest grid technology and high level architecture (HLA), was proposed. GDSP is the base infrastructure of service-oriented simulation support environment. And it can run simulations on wide area network efficiently, realize share and reuse of simulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.