The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Computing was growing so fast today. The services are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). This development of cloud computing align with the development of computer in this new age which turn people to work mobile and faster. Cloud computing could be one of the new tools in supporting learning process for students in Higher Education...
Cloud computing has been evolved from server based context to service-oriented context. This transformation poses lots of challenges to a cloud environment in terms of cloud service reliability and information security. In most of the aspects of current cloud service environment, lot of information exchange taking place without much security. In this context cloud computing, with reliability and security...
Cloud Computing is a Service Delivery Mechanism. Computing resources are delivered as a service over the network. These services are Scalable, Autonomous, and Cost effective in nature. Cloud Computing is responsible for the exponential growth of IT Industry. In spite of having so many advantages it has various security challenges that cannot be ignored. In order to make the Cloud Computing all the...
Cloud computing brings convenience for people to use IT resources, but also brings great challenges to the maintenance service of cloud computing environement. How to ensure the quality of maintenance service for cloud computing has become a problem. This paper proposes two models for quality management. One is the service quality management model for maintenance service. The other is the service...
A new committee* under the Industrial and Commercial Power Systems (I&CPS) Department of the Industry Applications Society (IAS) received approval at the October 2014 IAS Annual Meeting, in Vancouver. This committee will be dedicated to the special needs and characteristics of the Educational and Healthcare segments of the US and World economies. For example, these two segments of the US economy,...
Integration of hospital information systems (HIS) is an important area and one the basic requirements of hospitals since it increases quality of care and at the same time reduces costs of creating, upgrading, updating and keeping up with technology and healthcare industry standards and information technology. Cloud computing with features like multitenancy, massive scalability, elasticity, pay as...
For some years now, the concept of Cloud Computing (CC) is presented as the new revolution of information technology. It presents not only a technical innovation for better IT system flexibility, improvement of working methods and cost control, but also a new economic model, built around the concept of IT Services that are identifiable, classifiable and countable for end users, who can benefit by...
Increasingly, public organizations require higher levels of reliability and flexibility from information systems (IS) while trying to reduce costs at the same time. Cloud computing is a promising technology to fulfill these requirements. In particular, Desktop as a Service (DaaS), as one facet thereof, offers reliability and flexibility by means of consistent anytime anywhere access to applications...
When dissatisfied, an employee has two discreet options: exit or voice [19]. While exit is defined as leaving the organization, voice represents an effort to gain correction of the dissatisfying situation. As managers, we want our valued IT professionals to communicate their dissatisfaction and give us an opportunity to correct the situation, rather than move directly to exit. To increase the likelihood...
Social networks facilitate information sharing and communication among people who have common interests. Although social networks have been widely used to compute the reputations of Web services, they are limited in the ability to support the sophisticated estimation of service reputations. This paper proposes a sophisticated method of computing service reputations, which considers service requesters,...
The task allocation is important part of cooperation behavior modeling. It's influenced by communication and combat capability. According to the existing study, our task allocation model chooses the strategy of agency communication to expend communication network. We use iceberg model to classify the combat capability, and propose the method based on entity comprehensive capability and strategy of...
This study aims to theoretically construct a research model based on literature review in order to investigate the trust factors that affect the adoption of cloud-based supply chain management (SCM) systems. A new research model is comprised of six antecedent trust factors (communication, learning capacity, participation, usability, security, and reliability) that should influence the supply chain...
This communication aims to identify factors fostering Information Technology (IT) acceptance by nurses in Morocco. It suggests a model based on the Unified Theory of Acceptance and Usage of Technology [1] extended by a new construct called “Trust”. The study was conducted in public and private healthcare organizations located in Agadir city, south of Morocco. It concerned 250 nurses, representing...
Proteus is an open-source simulation program that can predict the risk of data loss in many disk array configurations, among which, mirrored disks, all levels of RAID arrays and various two-dimensional RAID arrays. It characterizes each array by five numbers, namely, the size n of the array, the number nf of simultaneous disk failures the array will always tolerate without data loss, and the respective...
This paper reports on the development of a model to improve the understanding of the extent of Enterprise Resource Planning (ERP) system usage in universities. Previous research revealed that university ERP systems are not fully utilized by end-users, resulting in low usage and institutional inefficiencies. This leads to stakeholders particularly students and government pressurizing universities to...
Service-oriented architecture (SOA) has been widely adopted in the development of many net-centric application systems. In SOA, services potentially from different domains are composed together to accomplish critical tasks. In these systems, security and trustworthiness are the major concerns that have not been well addressed. Many access control models have been developed to ensure proper accesses...
Most of the existing trust models don't perform well in preventing malicious nodes from profiteering by conspiracy attack or periodic attack, and pay little attention to incentive mechanisms in the environment of Virtual Organization (VO). This paper proposes a new distributed trust mechanism in Single-core VO, which chooses the new node by Group-Choose mechanism that aggregates direct trust (Direct...
HIPAA security compliance in academic medical centers is a central concern of researchers, academicians, and practitioners. Despite increasing accounts of data security breaches, greater numbers of information technology implementations, and new HIPAA Security Rule requirements and audits, academic medical centers have shown limited HIPAA security compliance. Based on a literature review of technology...
In order to improve the reality and the reliability of the current air combat simulation and the airborne weapon system evaluation in uncertain, hostile, complex and dynamic air combat environment, we propose an intelligent antagonism target team of air combat based on MAS (multi-agent system) under presented research results. To improve the social mental attribution of the target team, we develop...
The growing number of PKIs (Public Key Infrastructure) and the increasing number of situations where partners of a transaction may carry certificates signed by different CAs (Certification Authority) point out the problematic of trust between the different CAs. The degree to which a relying party can trust a CA depends upon the quality of its announced policy and its commitment to this policy. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.