The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses different aspects of performing monitoring in the context of software intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable to adapt to a number of dynamic scenarios during the system evolution. Based on analysis of monitoring needs in this type of a domain, a set of core...
The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure...
In the business context, accountability has become a major concern for businesses around the world in aftermath of corporate scandals and fallouts. However, accountability has not been rigorously considered in IT system technologies and solutions. The goal of this study is to provide a clear understanding of accountability concept in service-oriented computing and, more generally, e-society. We first...
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each other according to changing objectives. Following the service-oriented architectural style, the approach of so called device-based service systems emerges. The challenge is to build and manage these systems in a reliable, secure,...
Current automated evaluation systems are generally centralized structure and synchronous response mechanism which leads to highly coupled architecture, single business logic, lacking scalability, adaptability and flexibility. Based on SOA concept, this paper presents a distributed service-oriented solution to implement a loosely coupled, highly reliable automated evaluation system which has good scalability...
Automotive and avionics systems are complex, distributed, software-intensive systems-of-systems (SoS). Consequently, system integration is a central challenge in both domains. Important cross-cutting requirements aspects, such as security, authorization, and failure management, are best understood as properties of the interplay among sub-systems. Yet, traditional development processes address the...
The following topics are dealt with: interconnection networks; distributed processing; parallel processing; multi-core architectures; distributed systems; intelligent systems; ubiquitous systems; middleware; ubiquitous networking; wireless sensor networks; mobile ad hoc networks; security; service computing; routing; Internet; Web technology; medical document processing; intelligent medical information...
Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurring or attempted intrusions and highly improve security expert's work efficiency. Traditional alert correlation system adopts a centralized architecture which can be easily over flooded...
Only commercial cloud solutions have been implemented so far, offering computing resources and services for renting. Some interesting projects, such as Nimbus, OpenNEbula, Reservoir, work on cloud. One of their aims is to provide a cloud infrastructure able to provide and share resources and services for scientific purposes. The encouraging results of volunteer computing projects in this context and...
Facing the drawback existing in the stand-alone image processing software, the article proposes a Web-based online image processing software architecture, and make use of the advanced image processing technology of Java Applet and JAI to achieve. Detailed introducing and analysis the programming development method of JAI advanced image processing technology and Applet plug-in implementation process...
The architecture of designed intrusion detection system is based on two layer hybrid model for event detection. System function is based on analysis parts of network flow in a real communication and offers processing of this data in a real time. The core of the first layer are detection sensors, which offer base processing based on statistical methods with direct interconnection to countermeasure...
To expand the use of distributed computer infrastructures as well as facilitate grid interoperability, OGSA has developed standards and specifications that address a range of scenarios, including high-throughput computing, federated data management, and service mobility.
Workflows in the physical world are implemented based on forms printed on paper and signed by the involved people. In contrast workflows in service oriented architectures require a central entity for execution that results in an inflexible system design that is not suitable for ambient environments. Based on an ambient environment example a security approach for decentralized workflows is presented...
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affected by the commissioning efforts needed to bring them up and running. The dedicated cabling, initial engineering efforts and sophisticated binding and configuration tools often prevent home owners from investing in such networks...
Like RM-ODP [1], enterprise architecture (or EA for short) has its own perspectives as a basic construct for its architecture definition to represent areas of concern. In this paper, difference between RM-ODP and one concrete example EA, and applicability of Use of UML for ODP system specifications [2] (or UML4ODP in short) standard to the example EA, are discussed. Several additional diagrams that...
The next generation Internet will be highly diversified in both underlying networking technologies and supported networking applications. The diversified Internet architecture requires effective collaboration among heterogeneous network domains to support various application requirements. One of the challenges to achieve this objective lies in enabling network domain collaboration and network-application...
Service-oriented architecture has the major advantage of enabling rapid composition of distributed applications from various services, and has become increasingly popular for many large-scale service-based systems in various application areas, including scientific collaboration, e-business, health care, military, and homeland security. Situation awareness (SAW) is the capability of the entities in...
The following topics are dealt with: adaptive computing; architectures; design evolution; distributed systems design; embedded and real-time software systems; formal methods; model-based system design; modeling and analysis of complex systems; product-family models and architectures; reliability, safety, dependability, and security; system on a chip; system assessment, testing, and metrics; verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.