The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has proved to be a viable model for delivering information technology services through the web. It provides users the ability to share distributed resources owned by a central service provider at minimal setup costs. However, due to its nature, existing and potential users of the cloud are more concerned about the integrity, security and privacy of their data, and also the ability...
This paper deals with the future development of cloud computing. A detailed SWOT Analysis examines the most important factors to be considered for the future of cloud computing. Based on the outcomes, the real value of cloud computing is discussed, followed by the challenges for the future development of cloud computing. Those points finally lead to a statement regarding whether cloud computing represents...
Cloud based applications demand a higher level of security, privacy, and reliability toward a more cost effective solution. One of the challenges for the users of cloud-based services and applications is finding the most trusted provider for the minimum cost. The trusted providers from each customer can have different interpretation, or with different priority of the meaning. Furthermore, a tier-1...
Cloud computing moves the application software, platform and infrastructure into the large data centers which are maintained at the centralized location. The Cloud Service User (CSU) requests the resources from the cloud for their current requirements without investing the money. It is a pay-as-you-go-basis which means that the CSU pay what they actually consumed. If the Cloud Service Provider (CSP)...
Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in it. In evaluating whether to move to cloud computing, it is important to compare benefits and also risks of it. Thus, security and other existed issues in the cloud cause cloud clients...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
For application researches of the detection for the gas signal source, a method for orientation estimation of the gas signal source in the two-dimensional space and its algorithm are presented in the paper. In the method, a mode of dual-line gas sensor array is applied to sample the signals of the gas concentration in real time, and the time delay estimation, an approach of the signal processing,...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.