The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has emerged in recent years as a popular method of deploying information technology (IT) solutions within organisations. Cloud computing provides scalable, on-demand IT resources, which can be rapidly provisioned and utilised over the Internet. Cloud computing solutions can provide an excellent alternative for educational institutions where budget cuts have been incurred and cloud...
Since the phenomenon of cloud computing was proposed, there is an unceasing interest for research across the globe. Cloud computing has been seen as unitary of the technology that poses the next-generation computing revolution and rapidly becomes the hottest topic in the field of IT. This fast move towards Cloud computing has fuelled concerns on a fundamental point for the success of information systems,...
Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want...
It is crucial to guarantee content integrity in Named Data Networking(NDN), where copies of the contents are distributed over the network. NDN adopts digital signatures, and contents are verified whenever they are stored in caches. However, the current scheme is not practical in practice since its operations incur too much overhead. In this paper, we suggest a simple but effective solution for content...
The significant increase in the use of cloud computing, has led to an interest in partitioning applications over a set of public and private clouds in order to meet a range of non-functional requirements including performance (for example where private cloud resources alone are insufficient), dependability (e.g. To allow the application to continue to operate even if one cloud fails) and security...
Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the data of other potentially conflicting tenants' by means of inter-VM attacks. This paper discusses an innovative solution to overcome this data leakage problem by proposing the requirements for a so-called Conflict-Based Allocation...
Cloud computing is paradigm that has emerged to deliver IT services to consumers as a utility service over the Internet. In developing countries, particularly Saudi Arabia, cloud computing is still not widely adopted. As a result, this study seeks to investigate the most influential factors that can encourage an organisation to use the cloud or which might impede them from moving to it. This research...
With the rapid growth of the number of papers, the traditional methods of searching papers by scholar search engine are becoming unacceptable. These methods can't meet the needs of users and users still need to take a lot of time to filter the search results. To solve the problem, this paper uses the concepts and methods of community partition and introduces a model to recommend authoritative papers...
Volunteered Service Composition (VSC) refers to the process of composing volunteered services and resources. These services are typically published to a pool of voluntary resources. The composition aims at satisfying some objectives (e.g. Utilizing storage and eliminating waste, sharing space and optimizing for energy, reducing computational cost etc.). In cases when a single volunteered service does...
Cloud computing is a paradigm for providing and delivering IT services over the Internet. The cloud can provide several benefits for organisations including cost reduction and flexibility. However, migrating an existing system to the cloud is not an easy task because it is dependent on a number of factors. Therefore, this research aims to investigate the factors that may influence an organisation's...
With the increasingly widespread application of cloud computing, it has become a critical task for researchers to study techniques on cloud safety and standardization. In this paper, hybrid cloud security and fair Resource Allocation related problems are investigated. A security model based on trust negotiation is presented to fit the hybrid cloud environment. Furthermore, fair resource model and...
This paper presents a classify model of learning behavior on an intelligent tutoring website which provides a describing method of learning behavior. MFR Model creates a conceptual model and a analysis model according to students' learning behavior on the website. By using MFR model, influences of participation and learning effects can be judged by learning behavior which can not only strengthen the...
The first workshop on compliance, evolution, and security in cross-organizational processes (CeSCoP 2014) is held in conjunction with the 18th IEEE International Enterprise Computing Conference (EDOC 2014), in Ulm, Germany. The workshop purpose is to offer a portal for researchers and practitioners to discuss and contribute research on cross-organizational processes. The CeSCoP 2014 program includes...
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including asset recognition, weakness analysis, consequence property confirmation and risk calculation. Each object is modeled with Petri net. Specialists recognize software assets by the 1-9 scales...
Special secure multi-party computation is a hot topic in recent years' research. Privacy preserving path planning is that how to do path planning without leakage of privacy information. It has a very broad application prospects, but there is little study about it. In this paper, we propose a generation protocol for the common tangent of two circles in a privacy-preserving way, also analyze the correctness,...
Cloud storage is now an important developmenttrend in information technology. However, informationsecurity has become an important problem to impede it forcommercial application, such as data confidentiality, integrity,and availability. In this paper, we revisit the two private PDPschemes. We show that the property of correctness cannot beachieved when active adversaries are involved in these auditingsystems...
In recent years, information systems have become more diverse and complex making them a privileged target of network and computer attacks. These attacks have increased tremendously and turned out to be more sophisticated and evolving in an unpredictable manner. This work presents an attack model called AIDD (Attacks Identification Description and Defense). It offers a generic attack modeling to classify,...
Cloud computing technology provides a convenient way for the distribution and application of educational resource, which becomes the hotspot of ICT in education. Based on in-depth study of standards in cloud computing and E-Learning, the paper analyzes the requirement, key techniques and actual application of cloud computing education, constructs a standard architecture, elaborates the relationship...
Detection of high risk network flows and high risk hosts is becoming ever more important and more challenging. In order to selectively apply deep packet inspection (DPI) one has to isolate in real time high risk network activities within a huge number of monitored network flows. To help address this problem, we propose an iterative methodology for a simultaneous assessment of risk scores for both...
Cloud computing has become a very popular technology for IT infrastructure (infrastructure as a service - IaaS), with big players offering attractive pricing schemes. Software vendors are interested in offering products in the cloud as services. However, in order to evaluate software as an offer of service (SaaS) for a given enterprise application, we need to assess some qualitative factors other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.