The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web services have widely employed in many application fields. The loosely coupled and distributed characters of Web services also incur trustworthiness problem. Quality of service, reputation and security all can be taken into account for trustworthy Web services. The three aspects affect each other. In this paper, we propose concept of trustworthy Web services, and design an extend Web service model...
Enterprise software is being transformed from an installed product to a hosted service whereby customers pay a subscription fee to access functionality using a Web browser or other clients. The service-oriented architecture (SOA) and Web services will play a key role in driving the vision of software as a service (SaaS). As the number of services and users grow, there is a need for a trusted service...
The following topics are dealt with: bioinformatics; computer architecture; real time systems; soft computing; database; data mining; geographical information system; security; information assurance; network related simulation; parallel architecture; software engineering; grid computing; image processing; quality of service; network performance evaluation; parallel systems; wireless networks; system...
Acknowledged as important factors for business environments operating as virtual organizations (VOs), trust and reputation are receiving attention also in Grids devoted to scientific applications where problems of finding suitable models and architectures for flexible security management of heterogeneous resources arise. Being these resources highly heterogeneous (from individual users to whole organizations...
Wireless sensor networks have become a technology for the new millennium with the endless possibilities for applications ranging from academic to military. These tiny sensors are deployed in open environments, where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be applied. Therefore designing protocols that can...
In this paper, by introducing the conception of QoS matching offset between tasks and resources in grid scheduling tasks are able to be allocated on demand. Meanwhile, we take into consideration the utility of trust QoS between tasks and resources in the scheduling. Therefore, job schedule algorithm TD_QMO (trust-driven QoS matching offset) based on trust driven is presented for computing grid. The...
Many companies and governmental organizations are looking towards Web services, play an important key role in implementing service oriented architecture (SOA) as a platform that support a wide range of demanding applications. But current Web services standards have many critical limitations: performance degradation due to network latency and limited network bandwidth, vulnerability from security attacks,...
Self-adaptive security offers great potential in providing timely and fine grained security control. In this paper we experimentally investigate the effects of a security adaptation in various client-server scenarios. We do this using SSL/TLS and show how client load patterns determine the overall performance effect of a security adaptation. We also demonstrate the viability of such a system using...
IP multimedia subsystem (IMS) is a new next generation networking architecture that will provide better quality of service, charging infrastructure and security. The basic idea behind IMS is convergence; providing a single interface to different traditional or modern networking architectures allowing better working environment for the end users. IMS is still not commercially adopted and used but research...
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate...
Security association established by authentication schemes enables wireless networks resilient from external attacks. However, an enhanced security guarantee will influence network performance more or less. In this paper, we observe the detailed actions of a security association in the procedure of establishment and shift, in a wireless mesh network (WMN), i.e. a typical multi-hop network. To investigate...
In this survey paper, we assess existing approaches to security metric definition. We classify proposed definitions and discuss their advantages and problems. We argue that without a more restrictive definition, the apparently common term degenerates to a mere buzzword, which can be dangerous in terms of suggested comparability. We conclude with some guidelines on IS metric definition and sketch an...
When managing a complex information system for critical activities, reaching an high level of dependability is a key requirement. A central challenge is identifying a set of alternative system configurations to be enforced when particular system situations take place. In large systems, this task requires automation as the administrator can hardly cope with the complexity of all components and their...
This paper proposes a framework for automatic generation of rules to diagnose dependability problems. The generation process starts from formal models of the target system and its configuration, and exploits concepts and techniques from the risk analysis and management field.
Large, distributed IT infrastructures providing business-critical services have to protect themselves against internal and external threats and adapt to changing environmental parameters, as workload. Most widely applied, structural resilience mechanisms use some form of local static redundancy deployed to each critical resource for failover. However, recently both large-scale interconnected distributed...
The unpredictable fluctuations in computing resources, contexts, and user preferences that characterize pervasive environments have stressed the need for context-aware self-adaptive systems. So far, this research area mostly dealt exclusively with concerns related either to standard QoS or to security. Taking into account trade-offs between these two conflicting concerns is a key issue, since they...
Attack impact assessment is an important research in attack test and evaluation. Focusing on the end users' actual quality of service, a user-centric DoS attack impact assessment model based on 3GPP QoS indexes has been proposed. This model is a threedimensional denial of service degree assessment model.Based on the model one arithmetic has been proposed to measure the degradation of one service'...
Session initiation protocol (SIP), due to its simple architecture and well-defined content, is currently considered the premier signaling protocol for next generation networks (NGN). However, its simplicity will lead to serious security challenges in terms of privacy and integrity. Security mechanisms recommended by RFC3261 for SIP are either weak information protection methods or demand heavy computing...
CORE(COllaborative Review Environment) system is designed for a networked intelligent manufacturing system that uses virtual reality technology for design review, simulation and virtual manufacturing. Most virtual environment architectures, including CORE system, have mainly paid attention to the quality of service with little or no concern of information security of the virtual reality system. In...
This work presents an Internet traffic classification methodology based on statistical discriminators and cluster analysis. An accuracy identification of Internet applications is an important research area, because it is directly related to solve many network problems such as: quality of service (QoS), traffic control, security, network management and operation. The main difference to previous approaches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.