The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Services Oriented Architectures (SOA) represents a newmodel in the traditional way of designing systems becauseit is constructed around individual processes of different areas in an organization. In recent years, the necessity to integrate critical applications in a SOA has increased, that is the case of the Financial Applications. These applications require high reliability, information consistency...
In Cloud Computing Resources are allocated to customers based on their requests and prioritization, but sometimes a non-cloud provider organization wants to share their spare resources to same customers through Cloud Brokers so in this type of system a heterogeneous environment is created between regular cloud providers, Non- cloud provider organization, cloud broker and customers. In this paper we...
Though a variety of cloud storage services have been offered recently, they have not yet provided users with transparent and cost-effective personal data storage. Services like Google Docs offer easy file access and sharing, but tie storage with internal data formats and specific applications. Meanwhile, services like Drop box offer general-purpose storage. Yet they have not been widely utilized,...
As part of a continuing effort to make their organizations more efficient and flexible, manufacturers are rapidly migrating to Industrial Ethernet technology to network their industrial automation and control systems. The use of standard Ethernet technology enables organizations to control costs by moving from costly plant-optimized networks to a proven technology that is simpler to integrate, requires...
Attribute information such as age, gender, and job is used in user registration and questionnaires.A verifier must consider what method to use for confirming attribute information when it is used online.For instance,the reliability of the information varies with the method:the verifier can accept the user's claim,confirm by certificate,confirm face-to-face or use other methods. Therefore, the reliability...
With the growing scale of storage systems, the single and static data organization strategies cannot satisfy the increasing demand of high performance and reliable I/O. One solution is to adjust data organization manually by administrators periodically, which causes high labor cost. This paper presents a dynamic data organization in mass storage systems based on an attribute-managed approach. The...
We present a practical, systematical method for the evaluation of the soft error rate (SER) of microelectronic devices. Existing methodologies, practices and tools are integrated in a common approach while highlighting the need for specific data or tools. The showcased method is particularly adapted for evaluating the SER of very complex microelectronic devices by engineers confronted to increasingly...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Due to the increasing complexity of Web systems, security testing is becoming a critical activity to guarantee the respect of such systems to their security requirements. To challenge this issue, we rely in this paper on model based active testing. We first specify the Web system behavior using IF formalism. Second, we integrate security rules -modeled in Nomad language- within this IF model using...
A proposed grid middleware system includes specific enhancements to support the development and assessment of highly secure, dependable, service-oriented grid systems and applications. Service-oriented architectures can be defined as application architectures "within which all functions are defined as independent services.
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.