7,274 research outputs found
Trust models in ubiquitous computing
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models
BPM Adoption at Bilfinger
Big size corporate companies that opt for Business ProcessManagement (BPM) adoption invest a lot in BPM initiatives with theprimary focus on the identification and standardization of best practicesin the different phases of the BPM lifecycle. The business processes de-signed are usually seen as the standard way of executing the processesand tend not be adapted to specific customers' need or changing condi-tions. Furthermore, the acceptance of a paradigm shift by the end usersis an added challenge. This case introduces a success story on BPMadoption in complex environments where different organizational unitswith different needs are involved. The projects executed in different unitsrespond to specific customersâ requirements, which affects the set of pro-cesses to be designed and executed within them. We developed a novelapproach inspired by the Cynefin framework and used it to define processarchitectures and the respective business process models for a subset ofthe units. To ensure the applicability and acceptance of the new paradigmwe followed a number of well-known methodologies and practices (e.g.SCRUM and gamification). As a result, we managed to move from thetraditional function orientation to BPM orientation taking into consid-eration the flexibility needs, and we received very positive feedback fromour end users
DCCast: Efficient Point to Multipoint Transfers Across Datacenters
Using multiple datacenters allows for higher availability, load balancing and
reduced latency to customers of cloud services. To distribute multiple copies
of data, cloud providers depend on inter-datacenter WANs that ought to be used
efficiently considering their limited capacity and the ever-increasing data
demands. In this paper, we focus on applications that transfer objects from one
datacenter to several datacenters over dedicated inter-datacenter networks. We
present DCCast, a centralized Point to Multi-Point (P2MP) algorithm that uses
forwarding trees to efficiently deliver an object from a source datacenter to
required destination datacenters. With low computational overhead, DCCast
selects forwarding trees that minimize bandwidth usage and balance load across
all links. With simulation experiments on Google's GScale network, we show that
DCCast can reduce total bandwidth usage and tail Transfer Completion Times
(TCT) by up to compared to delivering the same objects via independent
point-to-point (P2P) transfers.Comment: 9th USENIX Workshop on Hot Topics in Cloud Computing,
https://www.usenix.org/conference/hotcloud17/program/presentation/noormohammadpou
Technology, privacy and identity: a Hong Kong perspective
This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial heritage. It then highlights the importance of identity management and considers the distinctions and overlaps between identity management and privacy protection. With this conceptual framework in mind, the article then considers the various laws in Hong Kong pertaining to data protection, with a focus on the aspects relating to identity management. It observes that while there is some legal protection in respect of the data relating to an individual's identity, there are other priorities which may take precedence in determining the extent of identity management under the legal system in Hong Kong. Finally, recommendations are made as to how to improve identity management within the context of data protection in Hong Kong
Recommended from our members
Trust Model for Optimized Cloud Services
Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or give less importance to uncertainty linked with the evidence. In this paper, we propose an uncertainty model and define our approach to compute opinion for cloud service providers. Using subjective logic operators along with the computed opinion values, we propose mechanisms to calculate the reputation of cloud service providers. We evaluate and compare our proposed model with existing reputation models
- âŚ