The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The arena of computer forensics investigation is a relatively new field of study. Many of the methods used in digital forensics have not been formally outlined. Digital Forensics is looked as part of art and part of science. This paper discussed breaking down the digital forensic investigation and their progression into an investigation development model so that an examiner can easily grip the problem...
Cloud computing represents a new IT model for consumption and delivery of the services over the Internet. Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture and utility computing.
As Cloud Computing begins to move beyond the pure hype stage and into the beginning of mainstream adoption, adopting cloud-based services or moving application services to the cloud brings a number of new risks, including: Cloud availability, Cloud security, Erosion of data integrity, and so on. However, for enterprise which require visibility, trust and control over cloud-based services. To maximize...
Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing. We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight...
With increasing development of Internet, grid as a new structure of distributed network will be discussed more and more, while its security is facing the heavy challenge and restricts application of grid. The international research shows that grid security is on the way to trustworthy grid. Apart from current trust model, the future trust model in grid should add users' behaviors reflecting users'...
This position paper outlines the need and rational for developing large-scale emulation facilities structured to allow the scientific method tenets to be met on a per experiment basis. The work specifically focuses on the need to develop emulation-based test beds on the 1000+ machine scale, as expressed within the U.S. Defense Advanced Research Program Agency's (DARPA) BAA-08-43 Broad Agency Announcement...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Like RM-ODP [1], enterprise architecture (or EA for short) has its own perspectives as a basic construct for its architecture definition to represent areas of concern. In this paper, difference between RM-ODP and one concrete example EA, and applicability of Use of UML for ODP system specifications [2] (or UML4ODP in short) standard to the example EA, are discussed. Several additional diagrams that...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.