The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Uptime is very important with any computer system, because a solution which is not available cannot be relied upon to provide accurate information in a timely and routine manner — usually resulting in the loss of time, revenue, or data. Highly-available systems and websites rely on eliminating single points of failure, and on reacting quickly to any network, hardware or software issues which may occur...
Aiming at the problem of internal attackers of database system, anomaly detection method of user behaviour is used to detect the internal attackers of database system. With using Discrete-time Markov Chains (DTMC), an anomaly detection system of user behavior is proposed, which can detect the internal threats of database system. First, we make an analysis on SQL queries, which are user behavior features...
As software engineering researchers, we are also zealous tool smiths. Building a research prototype is often a daunting task, let alone building an industry-grade family of tools supporting multiple platforms to ensure the generalizability of results. In this paper, we give advice to academic and industrial tool smiths on how to design and build an easy-to-maintain architecture capable of supporting...
Authentication mechanisms available in existing cloud platforms are inadequate for and poorly-suited to modern cloud-based systems. To support this argument, we describe a variety of authentication mechanisms commonly used in the cloud, and we detail how these mechanisms are actually used in one significant open-source service deployed to a popular cloud platform. We further report on authentication...
Cloud computing offers the potential for productivity, cost savings and innovation advantages to organizations. To utilize these benefits, to facilitate wide-scale cloud adoption and to embrace cloud computing, we must address many cloud security challenges. Attackers can compromise the vulnerable hosts and can either take over their resources or use them as stepping stones for future attacks. Open...
Leveraging Virtual Machine (VM) technologies to host multiple Web applications on the same physical machine can improve the resource utilization and thus save a cloud provider's provisioning cost. By allocating and scheduling virtual CPU (vCPU) resources for running VMs, a hosted Web application may achieve varying performances. Thus, when facing an end user with a specific SLA (Service Level Agreement)...
This paper's purpose is describing and highlighting of how our system is intended to work and how it can help us in everyday life, as well as making the Earth a safer and cleaner place, by not even noticing it's presence. Our system is always monitoring the traffic of every major city, analyzing it and making decisions on how people should drive, in a manner that the roads are safer, the fuel consumption...
Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific...
OpenEHR is an open standard specification for developing flexible electronic health record (EHR) management system. It defines the standard service models and APIs, and offers a whole lifetime data storage method to the patient's record. As an important OpenEHR system component, EHRServer plays the role of back-end services repository for data storage and query. It complies with the openEHR specifications...
We consider a basic caching system, where a single server with a database of N files (e.g. movies) is connected to a set of K users through a shared bottleneck link. Each user has a local cache memory with a size of M files. The system operates in two phases: a placement phase, where each cache memory is populated up to its size from the database, and a following delivery phase, where each user requests...
Shah, Rashmi and Ramchandran recently considered a model for Private Information Retrieval (PIR) where a user wishes to retrieve one of several Ä-bit messages from a set of n non-colluding servers. Their security model is information-theoretic. Their paper is the first to consider a model for PIR in which the database is not necessarily replicated, so allowing distributed storage techniques to be...
Physical activity monitoring represents an important tool in supporting/encouraging vulnerable persons in their struggle to recover from surgery or long term illness promoting a healthy lifestyle. The paper proposes a smart, low power activity monitoring platform capable to acquire data from 4 inertial sensor modules placed on human body, temporarily store it on a mobile phone for real time data display...
We consider a cache network, where a single server is connected to multiple users via a shared bottleneck link. The server has a set of files, which can be cached by each user in a prefetching phase. In a following delivery phase, each user requests a file and the server delivers user demands as efficiently as possible by taking into account their cache contents. We focus on an important and commonly...
There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient protocols...
The notion of a Private Information Retrieval (PIR) code was recently introduced by Fazeli, Vardy and Yaakobi [1] who showed that this class of codes permit PIR at reduced levels of storage overhead in comparison with rephcated-server PIR. In the present paper, the construction of an (n, k) τ-server binary linear PIR code having parameters n = ℓΣi=0(mi), k = (mi) and τ = 2ℓ for any integer m ≥ ℓ ≥...
Operation services are reusable and shareable units of configuration code executed by configuration management tools (CMTs), achieving continuous deployment and continuous delivery. With the prevalence of DevOps (Development and Operations), thousands of operation services have been developed for various software systems, and they are publicly available through the online repositories of popular CMTs...
Hadoop is now the de facto standard for storing and processing big data, not only for unstructured data but also for some structured data. As a result, providing SQL analysis functionality to the big data resided in HDFS becomes more and more important. Hive is a pioneer system that supports SQL-like analysis to the data in HDFS. However, the performance of the early-version of Hive is not satisfactory...
We study a two-hop cache-aided network, where a layer of relay nodes connects a server and a set of end users, i.e., a combination network. We consider the case where both the relay nodes and the end users have caching capabilities. We provide upper and lower bounds which are applicable to any combination network, noting that previous work had focused on models where the relays do not have caches...
Database is widely used for information storage and management. With the explosion of the data size, the requirement of the storage capacity is growing dramatically. Cloud offers clients a scalable solution to meet the demand of the increasing space. A cloud service, if used and managed properly, can increase the resource usability and provide more secure services. In this paper, we propose a cloud-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.