The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines service migration in a new computing paradigm, the cloud computing environment (CCE), by examining security and integration issues associated with service implementation. We postulate that a cloud architecture will evolve to be both more flexible and heterogeneous in resources because of the services complexity demanded by organizations. This introduces additional, but tractable,...
With a prevalence of pervasive computing, especially cloud computing, the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum...
Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing,...
In peer-to-peer (P2P) e-commerce systems, the trust mechanisms already proposed always replaced commodity's reputation with peer's reputation, so some peers often try to keep a relatively high peer's trust value while making their profit of doing some dishonest transactions. So, presented CRBT model (commodity's reputation-based trust model)-a novel trust mechanism. By introducing commodity's short-term...
According to the characteristics of pervasive computing, a suitable service model based on recommendation trust for pervasive computing is presented in this paper. In this model, the concept of recommendation credibility, credibility of service content and indirect credibility are introduced to overcome the problem of pervasive computing in the choice of service provider blindly. Recommendation credibility...
The study of macromolecular protein structures at an atomic resolution is the source of many data and compute intensive challenges, from simulation, to image processing, to model building. We have developed a general platform for the secure deployment of structural biology computational tasks and workflows into a federated grid which maximizes robustness, ease of use, and performance, while minimizing...
The technology of storage virtualization is widely used all around the world. The out-of-band network-based virtualization is an essential tendency of storage systems. According to the analysis, we find that there are some security problems in out-of-band network-based virtualization, for example the attacks to one server will do harm to the whole storage network. So we propose a secure system of...
With the rapid development of computer, insecurity factors(such as computer virus, hacker) influences the development of MIS, safety risk evaluation has been an important task. This paper describes a risk evaluation method for MIS based on fuzzy set theory which uses linguistic variables and respective fuzzy numbers to evaluate the factors. The primary weights of factors and evaluation of alternatives...
Both cloud and GRID are computing paradigms for the large-scale management of distributed resources. Even if the first is usually oriented to transaction-based applications, and the latter to High Performance Computation, there is a lot of interest in their integration. This is typically obtained through the Infrastructure-as-a-Service cloud model, which is exploited in the GRID context to offer machine...
As a part of Cloud computing, Software as a Service (SaaS) enables users to cut their costs by outsourcing software as a service on-demand, in which both computation and storage are handled on server-side. However, data must be decrypted into memory when performing the computation, even though they can be encrypted during storage and transmission. In this case, the privileged administrators of SaaS...
Industry, finance, and other business activities are increasingly reliant on computer networks and systems, which demand effective interoperability of systems. But this also demands effective systems security, which poses a major challenge to the socio-technical interactions enabled by interoperable tools. This paper addresses modeling of the linkages between interoperability and security in the model...
The existence of malicious service provider could damage the correctness and availability of e-commerce systems based on web service. So a new authentic trust model for web service e-commerce is present in this paper. It says that the trust for web service e-commerce is comprised of the trust degree of service business and the trust degree of customer evaluation. During trust degree computing, service...
In the open distributed environment, the knowledge of belief is absent for the entity with which we will contact, so the recommendation trust is very important for the distributed system. In this paper a recommendation trust model is proposed based on encouragement and punishment. In the model, the trust value of any entity consists of trading reputation value and recommendation reputation value,...
This paper presents a model of multi-cover based on static Markov chain. Researched on incomplete steganography system, analyzed the working principle and its implementation steps for shortage of single cover of capacity, embedded security and poor restorative, and given safety analysis of model.
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in...
This work extends our proposed property-based vulnerability model (VPRG and VPRM) to score the impact of vulnerabilities by: (1) using the model to distinguish the cause- and consequence- factors that later affect the impact score of vulnerabilities and (2) using the scoring algorithm that considers the relationship of properties evolving in the cause- and consequence-set. We use this scoring framework...
Trust chain is one of the key technologies in trusted computing. According to analyzing and researching the concept and structure of trusted computing, this paper proposes an improved method to measure trust chain. Trust measurement is computed directly by CRTM, and then draw a conclusion that the novel method is much better than that before improvement by comparing the integrity and authenticity...
As people depend more and more on softwares, there has been an increasing demand for the trustworthiness of the software. To measure the trustworthiness of software, we need to design appropriate trustworthy metrics. We once proposed four metric criteria for the multi-dimensional trustworthiness of the software and a metric model which satisfies these four criteria. In this paper, we describe a new...
With the large-scale, open distributed systems appear, creates a dynamic trust management to make up for lack of a static trust mechanism. However, the existing trust models have the following problems: (1) do not consider the historical behavior enough. (2) Can not effectively prevent malicious behavior. To solve the above problems, an trust model based on rewards and punishment mechanism is presented...
Software process engineering has been the challenging in the past 40 years, in the sense that it has been the underpinning of software engineering. On the other hand it has been one of the fundamental and much importance notions in this field; however, the improvement of software process has been the most challenging in software engineering. In the sense, several software process models have been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.