The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a Service-Oriented Architecture, a service contains a set of operations with clearly defined input and output parameters. In addition to these operations and traditional QoS, offered services need to publish different levels of intrusion tolerance for two reasons. First, software vulnerabilities can expose services to malicious actors, and make them susceptible to attacks. So, intrusion tolerance...
Trust is an important factor to predict the behaviour of a Web Service and as a criterion for Web Service selection. Although considerable research has been performed in the offline and online worlds, analysis of trust in the Web Services environment has been limited. Most trust studies in Web Services are focused on trust establishment without identifying and considering the main trust definition...
Prevalent and popular virtualization technologies have concentrated on consolidating servers based on the CPU component of the workload. Other system resources, particularly I/O devices like network interfaces and disks have been always designed to be in control of the OS that is managing system resources. Sharing of these devices has been through the OS abstraction layers, with device always being...
Service-Oriented Architecture (SOA) paradigm facilitates the design of large systems as a set of loosely coupled services interacting with each other. These services, in turn, can be combined to form a more complex service. But, for services to be useful, they must satisfy non-functional requirements, especially security-related quality of service. Unfortunately, software vulnerabilities expose these...
The following topics are dealt with: solid-state devices; data security; data reliability; file systems; quality of service; disk recording; memory recording; and data access.
The problem that the traditional trust model for P2P network can not reflect accurately peers' behaviors introduces an improved trust model based on reputation. Trust will be divided into service reputation and credibility of recommendation, and storage, computing and update algorithm of trust and the randomly extraction algorithm based on credibility of recommendation are raised in the model. The...
Secure routing protocol attracts much more attention in mobile ad hoc networks for the purposes of secure data transmission. But the improvement of security often sacrifices the delivery rate or other QoS. We propose a secure routing protocol by integrating multipath routing and secret sharing, meanwhile, select efficient and secure multiple disjoint routes by integrating multiple metrics including...
Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement is an SLA specification that addresses the need of both producers and consumers of services to specify and negotiate terms and conditions of access to these services. This specification has gained wide acceptance in both the Grid computing and Web Services communities. WS-Agreement...
One of the missions of the North American SynchroPhasor Initiative (NASPI) is to create a robust, widely available and secure synchronized data measurement infrastructure, called the NASPI network or NASPInet. Leveraging the Phasor Measurement Unit (PMU), a GPS clock synchronized measurement device capable of measuring the current and voltage phasors in the power grid, NASPI will improve reliability...
Cloud Computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers' Quality of Service (QoS) requirements. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for...
In pervasive computing environment, Web services are widely adopted in dynamic business processes. When selecting service providers, quality of service (QoS) and security constraints should be considered simultaneously. However, most current research works about provider selection either focus on quality of service, or just take into account security constraints. In this paper, we propose an evaluation...
Next Generation Internet Applications will experience many paradigm shifts from what we have seen so far. Through various technologies like applications mash-up, content aggregations, grid computing, cloud computing, Web 2.0, Web 3.0, applications will have to adopt novel software engineering techniques for development and deployment. Scalability, Interoperability, Availability (tolerance to failure),...
Security is an important QoS attribute for characterizing intrusion tolerant systems. In order to evaluate security performance of an intrusion tolerant system more effectively and directly, quantifying its security is inevitable. From the view of practical application, this paper provides a novel quantifying method. The security of intrusion tolerant systems is quantified to three explicit attributes...
A trust model for P2P network is proposed in this thesis, namely CRM, a cluster and recommendation based multi-granularity trust model. Compared to the current trust model, some problems can be solved better, for instance, these disadvantages contain great costs due to iterative calculations, and security such as disguise, slandering caused by anonymous and open characteristics of P2P networks. The...
The platform for the railroad is not sufficient to provide intelligent services. Currently, the railroad system provides limited services. However, the demands for information related to environments of train are increasing. In this paper, we propose the platform which can provide context-aware information services, intelligent services and integrated services quality of service. It can establish...
Semantic Web is emerging as a promising integration of trust management systems, fostering the use of ontology to achieve a common language for communication among humans, computers, and programs. In this paper, a novel Semantic Web solution called COmposite trust and Trust management in Opportunistic Networks (COTTON) is proposed, which provides an architectural basis for representing trust and trust...
Nowadays, there is a large diffusion of open and dynamic cooperative architectures that are based on services (SOA). In general, a customer is not only interested in service functionalities, but also in its quality (i.e. performance, cost, reliability, security and so on). In this scenario, models, techniques and tools supporting the effective selection of the service that provides the better quality...
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however,...
The paper offers tree-structured connectivity between the peer entities over an infrastructure network as an abstraction to embody the application-oriented processing functions on peer-to-peer information flows. Tree reconfigurations are triggered when failures or security violations occur in the connectivity path between the peer nodes (e.g., increase in path delays, DOS attack on a node). Reconfigurations...
In residential environments, a home gateway platform can offer services that are configurable by a user depending on current needs or preferences. Gateway devices are very often managed by a service provider or an access provider to enhance performance or guarantee QoS. Assuming a multi-provider and/or multi-user scenario, a secure framework has to maintain security and privacy between different gateway...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.