The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-tenancy in cloud-based applications helps cloud providers improve their Quality of Service (QoS) and reduce service customization and maintenance time. This result is achieved by sharing resources among many tenants, which can be in the form of applications composed of multiple web services. However, distinct tenants may impose different security requirements on their perspective of the application...
Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal...
Middleboxes present new requirements that need to be integrated with traffic engineering applications that are already complex and consider myriad factors (e.g., routing, QoS, load-balancing). While it is possible to revisit traffic engineering algorithms to explicitly integrate middleboxes, such an approach is not compositional. Existing efforts at compositional SDN application development do not...
Satellite transmission based on IP may play important role for communication between event site and PPDR centers during large planned scenarios and disaster/unplanned ones. Geostationary SATCOM links that can be installed ad-hoc in any location present reliable and efficient way to transmit IP data even for voice communication based on VoIP. Using different mechanisms that handle multi connections...
The complexity of software systems has raised many challenges in the way they will be installed, configured, deployed and merged in the near future. The vision of a self-protecting system with the capability of defending itself as a whole as well as planning how to mitigate the attack given different scenarios and requirements is one of the most promising research directions to solve these challenges...
Web services are the key technologies for the web applications developed using Service Oriented Architecture (SOA). There are many challenges involved in implementing web services. Some of them are web service selection and discovery which involves matchmaking and finding the most suitable web service from a large collection of functionally-equivalent web services. In this paper a fuzzy-based approach...
This paper investigates the secure information transfer issue for cognitive radio networks that have multiple non-altruistic primary users, secondary users and eavesdroppers. The design objective is to improve the secrecy rates of the primary users, and create the transmission opportunities for the secondary users. To achieve this goal, we propose to incentivize the non-altruistic users to cooperate...
The Quality of Information (QoI) in Participatory Sensing (PS) systems largely depends on the location accuracy of participating users. However, users could easily provide false information through Location Spoofing Attacks (LSA). Existing PS systems are not able to efficiently validate the position of users in large-scale outdoor environments, thus being prone to reduced QoI. In this paper we present...
With the looming urgency of e-Health technology mandated certification, privacy protection implementation and e-Health reporting in the year of 2014, service providers have to conform to the latest e-Health regulations (i.e., the "Final Rules of 2014") in the United States. We investigated the Service Context Management Solution for both the CE (Covered Entity) and BA (Business Associate)...
Based on the findings from a systematic literature review (SLR), this paper presents a ranking of the key challenges and opportunities for cloud computing services and derives key requirements of effective cloud services. Top challenges include security, quality of service (QoS), privacy and resource management and scalability, whereas top benefits include reduced computing costs, consistent QoS and...
One of the obvious challenges in cloud environments is trust crisis and its influence on the development of cloud computing. This paper analyzes the similarities and differences between cloud computing and other distributed environments, proposes the concept of trust and three different directions of trust-oriented research in cloud environments. According to three directions of trust-oriented research,...
Quality of Service (QoS) play very important role in web service recommendation system. The precision of service recommendation depends on the credible QoS. So people begin to find better method for calculating the credibility of QoS. We can count the execution result and user comment to calculate the QoS credibility of single web service. But how to calculate the QoS credibility of web service composition...
4G communication systems provide a global communication standard for each and every communication facilities and internet and telecommunication service providers of the globe. The major attraction of 4G is the network selection policy which enables users to select services offered by the best of the various service providers. The main purpose of this paper is to discuss network selection in 4G systems...
Open network promotes the cooperation activities and resource-sharing service among entities. It makes trust one of the critical issues in security field. Some trust quantification models can only quantify trust relationship in the same environment, without considering the influence of trust context. The influence of trust context to trust relationship is investigated. A definition of equivalent experience...
To realize commercial application of web services, its trust and reputation model has been raised into the agenda. And also many researches have been done on web services trust evaluation model. However, in practice there exist a few interferences to influence web service trust evaluation. For example, service providers may improve his own QoS level on purpose or giving vicious evaluation for his...
Summary form only given. Information Assurance (IA) grew out of the field of computer network security. However, IA is a much broader term than network security and relates to the managing of the risks associated with the use, processing, storage, and transmission of information. The most basic model of IA relies on three properties: confidentiality, integrity, and availability, thus it is often referred...
Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in next generation networks. Related research work is being carried out for years, and various service composition approaches have been proposed by different standardization organizations and companies catering to different network requirements...
Services participating in the composition are usually co-ordinated according to a workflow, composed by several activities, each of which carried out by a service. The binding of services to workflow activities may be affected by several parameters (e.g., QoS, price, reputation, etc.). In this paper, we propose a service binding driven by a further important requirement, that is, the incompatibilities...
Recent years have witnessed a proliferation of the number of wireless technologies available to access the Internet, ranging from wireless local area networks to cellular and broadcast systems, and ad hoc and mesh networks. While the emergence of these new technologies can enable truly ubiquitous Internet access, it also raises issues with the dependability of the Internet service delivered to users...
Recent advances in wireless communications and microelectronics have enabled the development of low cost, low-power, tiny nodes that can be deployed anywhere, establishing communications among them, forming wireless sensor networks (WSN). Middleware have long existed before in many domains, and now they are being integrated in the WSN domain. Due to their particularities, middleware designed for WSN...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.