The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SOA has the characteristic of abstraction, loose coupling and interoperability, but there are some defect related to security and trust. How to specify and verify functional and non-functional requirements for service-oriented architectures had received much attention recently. This paper is to employ a hardware-based trust mechanism called Trusted Platform Module to bootstrap trust in a service-oriented...
Security-by-Contract (S??C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S??C enriched with an automatic trust management infrastructure. Indeed, we enhance the already existing architecture by adding new modules and configurations for contracts managing. At deploy-time, our system decides the run-time configuration depending on the...
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds are made interoperable, federations of clouds may be formed. Such federations are from the point of view of the user not burdened by vendor lock-in, and opens for business possibilities where a market place of cloud computing...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Requirements modeling has been recently introduced in the UML world with the form of a new profile called SysML. This paper explores the possibility to link concepts used to describe requirements with those of the enterprise language of RM-ODP. Some correspondence rules are proposed and illustrated on a case study.
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.