The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the...
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution...
The following topics are dealt with: server-side streaming processing; DRM; grid computing; service-oriented communities; service-oriented architecture; Web service security; automating composite SLA management; QOS-aware service composition; Web service anonymity; object-oriented design; Wide World Web; Web browser; model-driven service management; business processes engineering; unified service...
The Internet offers an enormous potential for all kinds of services, from Web search to online shopping, from social networks to multi-player online games,from online auctions to online encyclopedias. Many of these services thrive due to a vibrant community support. Making services open to community support offers great potentials but makes them also vulnerable to malicious behavior. Malicious behavior...
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality...
The following topics are dealt with: parallel processing; distributed processing; operating systems; middleware; scheduling; load balancing; computer networks; multiprocessing systems; mobile computing; pervasive computing; software development; Web services; wireless networks; data security; and cloud computing.
As Cloud Computing begins to move beyond the pure hype stage and into the beginning of mainstream adoption, adopting cloud-based services or moving application services to the cloud brings a number of new risks, including: Cloud availability, Cloud security, Erosion of data integrity, and so on. However, for enterprise which require visibility, trust and control over cloud-based services. To maximize...
Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this paper, we present...
Cloud computing enables the provisioning of dynamically scalable resources as a service. Next to cloud computing, the paradigm of Service-oriented Architectures emerged to facilitate the provisioning of functionality as services. While both concepts are complementary, their combination enables the flexible provisioning and consumption of independently scalable services. These approaches come along...
Cloud computing delivers on-demand services with flexibility and scalability on a simple pay-per-use basis. However, major concerns regarding to security and privacy hinder a broad adoption by users, especially small- and medium-sized enterprises (SMEs). This is because existing guidelines, IT standards and laws on security and privacy do not take virtual environments into account. Thus, they present...
As the communication center and equipment center, Cloud Computing focuses on users and affords powerful data storage and web service functions. There are two examples of the application of the cloud service in the resource construction and service of libraries, such as ''OCLC's Strategies of MoveLibrary Management Service to Web Scale'' and ''Dura Cloud of Test Cloud Technologies for Digital Preservation''...
Desktop virtualization is a new delivery method in which desktop operating systems execute in a data center and users access their applications using stateless "thin-client" devices. This paradigm promises significant benefits in terms of data security, flexibility, and reduction of the total cost of ownership. It is important to further improve this approach while maintaining good user...
The following topics are dealt: cyber engineering; human space computing; distributed networks; security and privacy; heterogeneous wireless networks; resource management; security in wireless systems; web services; web and mobile applications; data models and query processing; performance evaluation and testing; SOA and embedded systems; middleware; cloud computing; RFID; wireless sensor networks;...
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc; for the smooth running of our daily lives. But...
For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due to lower resource consumption, but their adoption requires major conceptional changes in the processing...
Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired/wireless networking, providing sufficient assurance of information security such as confidentiality, authentication, non-repudiation, and integrity...
The Internet evolved to a generic platform and became a fully pervasive infrastructure providing services anywhere and anytime. The development of the cloud allows the assumption that every needed service has already been implemented. The authors argue that this technical viewpoint needs to be enlarged by service science aspects, where technology is only one perspective beside others like new business...
The following topics are dealt with : SOA implementation strategy; CRM system; semantic Web services; ERP system; telecom services management; objectionable video classification; software aging state evaluation; task-driven data mining; social-MRC social consensus formation support system; user-driven geospatial Web data; AC-DC boost converter; workflow modeling; customer satisfaction; maritime logistics;...
The data that is stored and/or transmitted on the Internet has been called "the blood of the IT". Along with the infrastructure and network based applications, data storage has been recognized as one of the major dimensions of information technology. The prosperity of Cloud Computing requires the moving from server-attached storage to distributed storage. Along with variant advantages, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.