The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) considers interconnected things e.g., devices that consumes web services through the internet. Such kind of devices may vary from smart phones, smart TVs, medical devices or industrial devices. Thanks to the development of the ICT field, many standards supports the existence of the IoT devices: HTTP (Hypertext Transferring Protocol), MQTT (Message Queue Telemetry Transport),...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
Sensing as a Service (SenaaS) is emerging as a prominent element in the middleware linking together the Internet of Things (IoT) and the Web of Things (WoT) layers of future ubiquitous systems. An architecture framework is discussed in this paper whereby things are abstracted into services via embedded sensors which expose a thing as a service. The architecture acts as a blueprint to guide software...
Merging the virtual World Wide Web with nearby physical devices that are part of the Internet of Things gives anyone with a mobile device and the appropriate authorization the power to monitor or control anything.
Network-based cloud computing is considered to be an emerging model of business computing, which maintains configurable resources such as processors, networks, storage, operating systems, database, and servers. One of the most successful paradigms that can be configured over the cloud is the Service oriented Architecture (SoA) environment, which provides a layered architecture for organising software...
Cloud computing is an emergent technology that offers a pool of configurable resources such as processors, networks, storages, operating system, database, and servers. These resources are offered as Web services deployed on the cloud. The coordination of the interactions between these services is one of the key challenges of cloud architecture. Any failings in these services could lead to lack of...
Service Oriented Architecture (SOA) is an architectural style that provides agility to align technical solutions to a modular business Web Services (WS) that are well decoupled from their consumers. This agility is extended to the Cloud model. To achieve a high level of security and a degree of decoupling, SOA encourages the use of standardized transport schemes such as SOAP/HTTP(s) with WS family...
Software engineering and its constant evolution bring new concepts, new technologies and new devices. It requires big efforts, skills and resources to acquire in depth knowledge of all the parts that are necessary for building applications professional and efficiently today. Many small technological companies and freelance developers have serious doubts about how to manage a project, where to start...
Cloud computing services (CCS) is a modern blend of provisioning technologies and management of resources formed on limited requirements such as accessibility, hypotheses of elasticity and massive deployment. This paradigm offers on-demand IT resources such as applications, networks, services, data, servers and storage that are readily accessible through the Internet. Need for globalisation and collaboration...
In this paper, we outline a tiered approach to auditing information in the cloud. The approach provides perspectives on auditable events that may include compositions of independently formed audit trails. Filtering and reasoning over the audit trails can manifest potential security vulnerabilities and performance attributes as desired by stakeholders.
Cloud computing has been evolved as a key computing platform for sharing resources and services. People should have a relatively convenient environment and life for handling home-appliances. This study designs and develops a Web 2.0 Service Platform (WSP) for DPWS-based Home-appliances in the Cloud environment, which is composed of mobile users, home appliances and the cloud environment. WSP automatically...
Paper deals with the design issues of an e-Learning Computational System based on a Task Management Model. One of the main components of the proposed e-Learning Computational Cloud is the Controller acting as an Enterprise Service Bus (ESB) for absolute Model abstraction from outside references. Simultaneously, View is completely decoupled from Model and ultimate privacy and security is achieved for...
In Cloud service composition, collaboration between brokers and service providers is essential to promptly satisfy incoming Cloud consumer requirements. These requirements should be mapped to Cloud resources, which are accessed via web services, in an automated manner. However, distributed and constantly changing Cloud-computing environments pose new challenges to automated service composition such...
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet. However, cloud computing facing so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality...
Web services define standard interfaces those provide good solution for enterprise integration. Recently, many researches focus on creating management standards to manage Web services. Web Services Distributed Management (WSDM) is one of the industry standards. However, to implement the WSDM interfaces needs to understand server Web service standards. It increases the complexity and difficulty to...
This paper aims to present a model for malware detection, uCLAVS (University of Caldas' AntiVirus Service), a multiple engine service that follows the set of defined protocols and standards for Web Services technologies, in addition an Ontology for Malware and Intrusion Detection is described. uCLAVS is based on the idea that the files analysis commonly carried by applications residing on the client...
Subtle implementation errors or mis-configurations in complex Internet services may lead to performance degradations without causing failures. These undiscovered performance anomalies afflict many of today's systems, causing violations of service-level agreements (SLAs), unnecessary resource over provisioning, or both. In this paper, we re-inserted realistic anomaly causes into a multi-tier Internet...
A significant proportion of e-Learning services are delivered through Cloud Computing. These use Web services as an interface integrator to support communication across heterogeneous platforms over internet protocols. Similarly, a high level of task collaboration is needed to form an e-Learning community. Therefore, we propose an e-Learning Computational Cloud (eLC2) based on the Model-View-Controller...
Since Representational State Transfer (REST) architecture was proposed by Fielding in early 1990s for distributed hypermedia systems, it has become a popular architectural style of choice in various computing environments. However, REST was not originally designed to support enterprise requirements, in particular the accountability requirements that are crucial for the business services offered through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.