Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The majority of business activity of our integrated and connected world takes place in networks based on cloud computing infrastructure that cross national, geographic and jurisdictional boundaries. Such an efficient entity interconnection is made possible through an emerging networking paradigm, Software Defined Networking (SDN) that intends to vastly simplify policy enforcement and network reconfiguration...
Ontologies play a key role in semanticinteroperability projects, capturing the conceptualizationunderlying the various systems to be integrated. In the case oflarge information systems landscapes, a single monolithicontology often becomes hard to design and maintain. In thissetting, it is common to divide the ontological model inconsistently interlinked modular ontologies, forming anontology network...
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
The nature of critical business information is changing rapidly and is no longer limited to structured text or numeric data. Unstructured content such as images, audio, video, PDF, Word documents and other types are becoming more and more common in various fields. Database is an area that has found extensive use of images and text in past few years. This paper present a model for storing unstructured...
The accelerating progress of network speed, reliability and security creates an increasing demand to move software and services from being stored and processed locally on users' machines to being managed by third parties that are accessible through the network. This has created the need to develop new software development methods and software architectural styles that meet these new demands. One such...
Traditional monolithic services fail to scale efficiently when a certain task within the service is flooded. They also have a long software release cycle due to the system complexity. Microservices, as a new architectural style, are built upon the idea of breaking a large service into a set of single-responsibility (along with other properties) services that are communicating over network. In such...
With the looming urgency of e-Health technology mandated certification, privacy protection implementation and e-Health reporting in the year of 2014, service providers have to conform to the latest e-Health regulations (i.e., the "Final Rules of 2014") in the United States. We investigated the Service Context Management Solution for both the CE (Covered Entity) and BA (Business Associate)...
IT services realized within cloud environments often suffer from a lack of transparency. On the one hand this opacity with respect to operational practices protects business secrets of a cloud provider. On the other hand, if services from critical infrastructures run within clouds this opacity becomes a severe problem, e.g., for a later root cause analysis in case of failures. This paper presents...
Nowadays, we put forward a kind of electronic forensics system based on user behavior correlation analysis in view of the present electronic evidence lack of supervision. The system builds knowledge base according to the business activity main body, behavior, and object constraints.It filters the original electronic evidence based on similarity of electronic evidence and realizes users' behavior association...
The first workshop on compliance, evolution, and security in cross-organizational processes (CeSCoP 2014) is held in conjunction with the 18th IEEE International Enterprise Computing Conference (EDOC 2014), in Ulm, Germany. The workshop purpose is to offer a portal for researchers and practitioners to discuss and contribute research on cross-organizational processes. The CeSCoP 2014 program includes...
The paper considers techniques for measurement and calculation of security metrics taking into account attack graphs and service dependencies. The techniques are based on several assessment levels (topological, attack graph level, attacker level, events level and system level) and important aspects (zero-day attacks, cost-efficiency characteristics). It allows understanding the current security situation,...
This paper presents the requirements engineering process for the Uganda Police Force Crime Records Management System. The system was envisioned to substantially improve the performance of the crime records management function of the Uganda Police Force through strengthening the pertinent processes. The requirements engineering process involved definition of the system context and goals, requirements...
It is the case that a growing number of trust models exist, each seemingly tailored to specific tasks and needs. In a great many cases, the trust models are intended to help people make decisions in uncertain circumstances or with a limited amount of knowledge. In almost all cases, this 'help' is in the form of an already made decision based on various calculations that may or may not be opaque to...
Multi-tenancy is a kind of technology full of business value in industry. It focuses on how to isolate and protect customer data in the same hardware and software platform. This paper makes research on multi-tenancy implementation based on DB2 for z/OS and proposes a best resolution. Furthermore, the paper also analyzes the factors which affect tenancy system interactively and suggests the proper...
This paper reports on the activities and findings from the 5th and 6th international workshops on adoption-centric software engineering (ACSWE), which were held in 2009 and 2010, respectively. The two workshops had a common theme of migrating to SOA. The overall goal of the workshops was to distill lessons learned from SOA migration case studies and experience reports from several application areas.
With the development of the university digitalized campus and widespread using of information systems, how to solve the sharing and interoperation of data between different departments and existing systems has become a new requirements of the development. Web Services has excellent characteristics like portability, loose coupling and Scalability, it can achieve the sharing and interoperation of data...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.