The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Maintaining security and privacy in the Cloud is a complex task. The task is made even more challenging as the number of vulnerabilities associated with the cloud infrastructure and applications are increasing very rapidly. Understanding the security service level agreements (SSLAs) and privacy policies offered by service and infrastructure providers is critical for consumers to assess the risks of...
Security alerts collected under real workload conditions represent a goldmine of information to protect integrity and confidentiality of a production Cloud. Nevertheless, the volume of runtime alerts overwhelms operations teams and makes forensics hard and time consuming. This paper investigates the use of different text weighting schemes to filter an average volume of 1,000 alerts/day produced by...
Cloud computing is not just a promising approach to the service provisioning: nowadays it represents the reference model in such field. Several cloud service providers have emerged as de facto standards and an increasing number of companies are choosing to migrate their business in the Cloud "ecosystem". Nevertheless, each provider adopts a particular interface to manage its services and...
The cloud computing provides better management and utilization of underlying infrastructures with resource virtualization. However, most of existing load balance models are unable to meet the special requirements of business such as the imbalance of peak period, the impact of nonlinear cross between varieties of business. Thus the reliability, scalability and self-organization of service becomes a...
In this paper, we will present a new approach for Data Analytics development. This new approach is based on the consolidation of the organizational procedures data following a process-centric approach. Three main components are involved in this approach: ETL Component, Process Flow Component and a Control Model Component. Furthermore, we explain the architecture of the process-centric framework gathering...
In this paper, we focus on Smart Cities, particularly revolution at the edges of the fabric, examining the objectives for developing a Smart City and the direct link between the business/requirements model and its delivery through services, applications, sensors and edge networks. We will provide an overview of how cities are developed and a view of how a Smart City is characterised. Whilst intelligent...
The usefulness of configurable and shared experiment platforms in design and implementation of future Resilient Smart Grids is demonstrated. A set of antagonistic threats is identified and remotely controlled experiments to harness those are presented and assessed.
In this paper, an Internet Public Opinion Monitoring System based on Administration for Industry and Commerce is proposed. The paper first analyzes the design of the system. Then describes the system in detail as five modules, they are Internet Collection Module, Data Preprocessing Module, Public Opinion Analysis Module, Service Module and System Management Module.
Security & Dependability (SEC&DEP) monitoring has definitely become a number one priority, since it is understood that it is the pre-requisite for allowing system operation to continue also in the presence of faults and/or attacks. Since effective remediation requires that the right actions be taken at the right time, in order for SEC&DEP monitoring to be really useful, the results of...
Article is devoted to working out the information technology for monitoring of business processes of the enterprise, allowing to automate formation processes of representations for the given business process. The block diagram of this technology is developed and appointment of its basic elements is considered. The technique for adjustment of the offered information technology taking into account features...
The first 72 hours is critical in saving human lives after a disaster occurred. Mobilizing many disaster rescuer team to many different places can be a daunting task. In this work, we propose a mobile-devices-based application which can be used to track the rescuer movement. The tracking records, which are displayed in a map, can be used by decision makers in command center to distribute rescuer team...
Service Level Agreements (SLAs) are essential to the service oriented business model of Cloud Computing. SLA Frameworks for cloud computing need methodology for negotiation and monitoring of service delivery. The success and acceptability of SLAs requires their trusted and secure monitoring. In this paper an SLA Framework which incorporates negotiation and secure monitoring mechanism involving a third-party...
Intelligent operation and maintenance is a novel technology mode of advanced transmission and distribution equipment management that can meet the demand of online monitoring, condition-based maintenance and visual management for equipment, as well as rapid load recovery repair and advanced asset management integration requirements. It serves as one of the most significant contexts to promote the standardized...
With the rapid development of information technology, we have already entered the era of big data. Currently the industry has put big data as its core competitiveness in the market, the advent of the era of big data indicates that who grasps data who holds the world. Consequent massive data processing technologies become the focus of research in the field, how to efficiently integrate planning, storage...
Information systems in general, and business processes in particular, generate a wealth of information in the form of event traces or logs. The analysis of these logs, either offline or in real-time, can be put to numerous uses: computation of various statistics, detection of anomalous patterns or compliance violations of some form of contract. However, current solutions for Complex Event Processing...
Modern software systems have grown in complexity and expense, even while the cost for supporting hardware has decreased over time. Humans have a lot to do with why software is expensive, and they contribute to its cost in at least three significant areas: the maintenance and evolution of existing software, the run-time monitoring and configuration of executing software, and errors made during data...
Although the popularity of activity-centric process management systems (PrMS) has increased during the last decade, there still exist business processes that cannot be adequately supported by these PrMS. A common characteristic of these processes, which is neglected by current activity-centric PrMS, is their need for object-awareness, i.e., the explicit processing of business data and business objects...
The process migration framework (PMF) aims to extract a process from a shared system that hosts multiple processes, and redeploy it in a dedicated virtual machine. Moreover, the PMF supports the documentation of the business process implementation. Main issues when migrating processes are the identification of the process environment (i.e. software packages, files, system settings) and the recreation...
Current systems for enacting scientific experiments, and in particular simulation workflows, do not support multi-scale and multi-field problems if they are not coupled on the level of the mathematical model. We present a life cycle that utilizes the notion of choreographies to enable the trial-and-error modeling and execution of multi-scale and/or multi-field simulations. The life cycle exhibits...
The intention of a Smart City concept is among other things to increase the energy efficiency of a city. Typically addressed topics are energy management or urban traffic management. Up to now Information and Communication Technology (ICT) measures within a Smart City to increase energy efficiency in public lighting have not been considered in detail. The paper presents an approach of an intelligent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.