The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the context of Data Integration Systems (DIS), integrating data across organizations varying in security and privacy requirements in addition to trust levels raises concerns of data leakage threats. In order to prevent these threats, an in depth threat analysis reflected on the architectural components of a DIS is required. This paper analyses data leakage threats and locations within the DIS architecture...
Significant efforts have been devoted to creating large scale compute and network testbeds for studying future Internet challenges. Besides large geographic span, the common emphasis is programmability, allowing researchers to reserve or create, via software, flexible sets of compute and network resources over specified topologies to execute research prototypes of new protocols, processes, and applications...
A Grid system is a promising solution for sharing distributed resources of registered participants to perform tasks whose demands may exceed the capacity of individual participating organization. However, the collaborative aspect of Grids is still underdeveloped as they lack features and mechanisms for human interaction and collaboration. This paper presents a prototype system for collaborative task...
When the Internet is the most part of human life, traditional learning is changed gradually. People will learn from the Internet besides in the classroom. This paper presents an approach of e-Learning based on semantic P2P Network?? Virtual Hierarchical Tree Gird Organizations (VIRGO), which takes advantages for all people can participate the activities due to its distributed technologies. The teachers...
We examine the essential characteristics of system complexity and simplicity and we describe a set of general design heuristics to address complexity. We distinguish inherent, irreducible complexity from perceived complexity. We illustrate a little theory of complexity with examples drawn from ultra-large-scale systems: telephony, the Internet, and the power grid. We then show how a toolkit of design...
By constructing e-Science projects, we have explored that the creation of a collaborative research platform, is in great demand. This paper explores the requirements and approaches to build a collaborative research platform named Duckling for e-Science projects. Our case study is the e-Science project in joint research center of the Chinese Academy of Sciences and the Qinghai Lake National Nature...
Companies that are present at multiple online locations may have difficulty staffing them adequately in terms of helpdesk services with efficient use of human resources. In this paper a technological architecture is presented that allows a team of people to staff several online locations simultaneously, providing to customers/users the indication of human presence to attend them. We also present details...
Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud computing platform model has been proposed to provide a closed box execution environment that guarantees confidential execution of guest virtual machines. However this model has significant drawbacks that it relies on the trusted third party...
Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented...
A System Architecture [SA] plays the leading role in ICT based organization. It covers the entire organization and helps to achieve the mission of organization. As other architectures, it also has set of components and the relationship (connectors) among the components. It has pre-defined life cycle that determines the duration of the system in which it should provide the services continuously. It...
Security concerns with respect to cloud computing have impelled the private sector to suggest a hybrid cloud architecture consisting of private and public clouds. For national security purposes, we advocate a hybrid cloud model that consists of private, public and community clouds. The community clouds in this architecture are as defined by NIST, and will be used for inter-agency and community-of-interest...
With the growing number of botnet attacks, the botnet detection is becoming increasingly important for the network security. To enhance the existing botnet detection systems which are short of efficient information collection functions, this paper presents a collaborative information collection model with a new 5-tuple structural mode. In the model, we introduce the static and dynamic roles to meet...
A system that would harness the brainpower of vast numbers of humans and orchestrate their efforts could be used to solve hard problems that are beyond the reach of computational methods. This paper describes such a system. This system will use a recursive problem solving life cycle model based on a continuously evolving distributed supply chain infrastructure. The problems to be addressed using this...
Recently, the autonomic communication networks paradigm has been introduced as a solution to the increasing management complexity of communication networks in the Future Internet. In order to encompass the large-scale nature of these networks, a general consensus has been reached that the supporting autonomic management architectures should be distributed for scalability reasons. However, several...
One of the network and services management problems is security, either in preventing attacks and using computational mechanisms to protect data and systems or in administrative matters, which involves not just what needs to be protected, but also what security service levels will be delivered. This paper explores Service Level Agreements for Security or just Sec-SLAs. Is tried to provide an overview...
Data center facilitates the e-governance system. Data center is a huge repository of data that is required by every stakeholders of e-governance system. It consists of many sensitive governments' data. Access of these data by every authorized stakeholder is one of the mandatory features of data center. At the same time, it has many challenges like the cost, management and updating it and also encounters...
Many of today's large-scale scientific projects attempt to collect data from a diverse set of sources. The traditional campaign-style approach to ??synthesis?? efforts gathers data through a single concentrated effort, and the data contributors know in advance exactly who will use their data and why. At even moderate scales, the cost and time required to find, gather, collate, normalize, and customize...
Cloud computing has recently paid attention as a way to share the resources to provide scalable and on-demand services. Across various authorities, cloud resources should be configured to a virtual organization (VO) according to user's requirements. Ontology-based representation of cloud computing environment would be able to conceptualize common attributes among cloud resources and to represent semantic...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
Overlay networks are becoming widely used for content delivery and file sharing services because they provide effective and reliable services by creating a virtual topology on top of existing networks. However, the management of overlay networks meet new challenges in the structure, security, services and deployment. This paper presents a survey of the overlay networks and correlated management. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.