The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A comprehensive security solution is no longer an option, and needs to be designed bottom-up into the car software. The architecture needs to be scalable and tiered, leveraging the proven technologies, processes and policies from the mature industries. The objective is to detect, defend and recover from any attack before harm comes to passengers, data and instrumentation. No matter how hardened security...
A comprehensive security solution is no longer an option, and needs to be designed bottom-up into the car software. The architecture needs to be scalable and tiered, leveraging the proven technologies, processes and policies from the mature industries. The objective is to detect, defend and recover from any attack before harm comes to passengers, data and instrumentation. No matter how hardened security...
The proposition of increased innovation in network applications and reduced cost for network operators has won over the networking world to the vision of software-defined networking (SDN). With the excitement of holistic visibility across the network and the ability to program network devices, developers have rushed to present a range of new SDN-compliant hardware, software, and services. However,...
Security has been always treated as an add-on feature in the software development lifecycle, and addressed by security professionals using firewalls, proxies, intrusion prevention systems, antivirus and platform security. Software is at the root of all common computer security problems, and hence hackers don't create security holes, but rather exploit them. Security holes in software applications...
This paper presents a DRM for Service Provider to reorganize resource from different DRMs, in view of the present situation of Chinese digital publishing industry. This DRM helps SP to provide value-added service which could be quite different from CP providing, such as redistribution, recommendation, renting and so on. It repackages various DRM licenses and SP copyright control description into one...
Trico Electric Cooperative Inc (Trico) is a nonprofit cooperative serving more than 38,000 rural customers in southern Arizona. Trico is challenged with managing a distribution system with a wide geographical dispersion. Trico required a system to centralize, control and manage access to all of its substation devices and related data. Trico sought to diversify available substation information and...
Based on demands in proxy pattern, this article proposes informatization solution of proxy pattern which includes enterprise management, proxy management, franchisee management and supply chain management, then discusses basic functions, system architecture of the platform as well as metadata services, security strategies, and finally gives a multi-user data model -shared database, shared architecture.
Energy management systems (EMS) are highly specialized real-time digital computer based control systems that were introduced in the late sixties to assist system operators in managing the power grid in a reliable and efficient way. The emergence of energy markets in the nineties led to the deployment of energy market applications, often tightly coupled with EMS applications.
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.