The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To overcome the current cybersecurity challenges of protecting our cyberspace and applications, we present an innovative cloud-based architecture to offer resilient Dynamic Data Driven Application Systems (DDDAS) as a cloud service that we refer to as resilient DDDAS as a Service (rDaaS). This architecture integrates Service Oriented Architecture (SOA) and DDDAS paradigms to offer the next generation...
A good and robust integration system cannot be separated from how the initial design of the system is selected and implemented. Therefore, integrating existing systems to become a large system that meets the needs of other connected systems requires full assessment and verification so that when the system is implemented, the necessary changes required in the future will be able to be accommodated...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and loosely-coupled services which are interconnected to accomplish a more complex functionality. The main security challenge in SOA is that we cannot trust the participating services in a service composition to behave as expected all the time. Moreover, the chain of all services involved in an end-to-end...
The accelerating progress of network speed, reliability and security creates an increasing demand to move software and services from being stored and processed locally on users' machines to being managed by third parties that are accessible through the network. This has created the need to develop new software development methods and software architectural styles that meet these new demands. One such...
Service Oriented Architectures have been increasingly evaluated and applied within military networks. However, existing implementations tend to overlook the constraints of the tactical environment, generating unsuitable requirements of network resources. The ongoing TACTICS project aims to study these constraints and propose solutions suitably adjusted to the tactical ecosystem. Under this scope,...
The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet services: (i) their modeling, provisioning and management, (ii) data protection, and (iii) data collection, storage and analysis. FISA is in its second edition and results from the fusion of the PASCS (Privacy and Accountability for...
The service-oriented architecture (SOA) paradigm is increasingly applied to the armed forces' IT infrastructures. However, existing SOA implementations tend to create increased demand on network resources and are thus not ideally suited for the disadvantaged networks of the tactical battlefield. Facing these disadvantages, we propose a tactical service infrastructure (TSI) which is currently being...
Service-oriented architecture (SOA), the well-defined structure in which business functions are carried out by the service multiple applications through standard protocols[1]. The major disadvantage is the difficulty in establishing SOA. The reason is that the system as a whole sub-system is the fragmentation issue to employees in full accordance rate. Despite the challenges involved in creating the...
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing...
Web services are the key technologies for the web applications developed using Service Oriented Architecture (SOA). There are many challenges involved in implementing web services. Some of them are web service selection and discovery which involves matchmaking and finding the most suitable web service from a large collection of functionally-equivalent web services. In this paper a fuzzy-based approach...
This paper describes a demonstration of a novel architecture that frees service providers from having to design a direct connectivity mechanisms between end users. To confirm the applicability and validity of our proposed architecture, we assumed three use cases: machine-to-machine home security, content distribution service and real time network game services. The results of our implementation confirm...
The Arrowhead project aims to address the technical and applicative issues associated with cooperative automation based on Service Oriented Architectures. The problems of developing such kind of systems are mainly due to the lack of adequate development and service documentation methodologies, which would ease the burden of reusing services on different applications. The Arrowhead project proposes...
Integration of hospital information systems (HIS) is an important area and one the basic requirements of hospitals since it increases quality of care and at the same time reduces costs of creating, upgrading, updating and keeping up with technology and healthcare industry standards and information technology. Cloud computing with features like multitenancy, massive scalability, elasticity, pay as...
In recent years, The Internet of Things(IOT) is one of the hottest research topics. It was originally defined as connected all the things through the sensing devices to the Internet. In addition, Service-Oriented methodology has gradually drawn people's attention. Therefore, integrated The IOT with Service-Oriented methodology is very important. But now IOT service composition is mostly synchronous...
Advanced and complex embedded systems as multicore and multiprocessor systems are becoming common and this has stimulated the development of critical applications for them. UAVs (Unmanned Aerial Vehicles) constitute a typical application of a complex critical embedded system. One concept that can result in radically different solutions in UAVs is the use of Service-Oriented Architecture (SOA). The...
Trust service is a very important issue in cloud computing, and a cloud user needs a trust mechanism in selecting a reliable cloud service provider. Many trust technologies such as SLA, cloud audit, self-assessment questionnaire, accreditation, and so on, are proposed by some research organizations like CSA. However, all of these just provide a initial trust and have many limitations. A hybrid trust...
This paper presents an efficient anti-money laundering warning system. With the development of science and technology, money laundering is becoming more and more intelligent. Since the existing anti-money-laundering process cannot handle this kind of crime effectively, we build a system based on mainframe with SOA architectures. For one thing, as mainframes pioneer massive data processing capacity...
The architecture of a Web system affects many of its quality attributes, such as testability, security, and accessibility. The architecture itself is influenced by factors such as system requirements, infrastructure constraints, and interoperability needs. This session is the fifth in a series of special events held at WSE focused on selected aspects of research directions in Web systems evolution,...
With the goal of accomplish the ubiquitous intelligence in social life, Cyber-Physical Systems (CPS) are getting growing attentions of researchers and engineers. However, the complexity of computing and physical dynamics bring a lot of challenges in the development of CPS, such as integration of heterogeneous physical devices, system verification, security assurance, and so on. A general or unified...
Cloud computing has become a common technology for provisioning infrastructure services on-demand. Modern Cloud platforms can provide cloud-based applications, software, deployment platforms, or general infrastructure services that may include both computational and storage resources. However existing Cloud provisioning models are based on proprietary solutions and don't allow the combination of services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.