114,412 research outputs found

    A Secure and Fair Resource Sharing Model for Community Clouds

    Get PDF
    Cloud computing has gained a lot of importance and has been one of the most discussed segment of today\u27s IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is developed which makes the resource availability and usage transparent to the community so that members can make informed decisions about their own resource requirements based on the resource usage and availability within the community. Furthermore, the fair-share model discusses methods that can be employed to address situations when the demand for a resource is higher than the resource availability in the resource pool. Various methods that include reduction in the requested amount of resource, early release of the resources and taxing members have been studied, Based on comparisons of these methods along with the advantages and disadvantages of each model outlined, a hybrid method that only taxes members for unused resources is developed. All these methods have been studied through simulations

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Full text link
    Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which credentials are exchanged. During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment. We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties. Our method is based on secure two-party computation protocols for set intersection. Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013

    Promoting U.S. Economic Growth and Security Through Expanding World Trade: A Call for Bold American Leadership

    Get PDF
    This report presents a leadership vision of a strong and open global trading system, and urges the United States and its trading partners to adopt vital policy reforms, including delinking agricultural subsidies from prices and production while opening agricultural markets everywhere, and eliminating all tariffs and non-tariff barriers in both manufacturing and services

    Common African Position (CAP) on the Post-2015 Development Agenda

    Get PDF
    That the post-2015 Development Agenda provides a unique opportunity for Africa to reach consensus on common challenges, priorities and aspirations, and to actively participate in the global debate on how to provide a fresh impetus to the MDGs and to examine and devise strategies to address key emerging development issues on the continent in the coming years. The post-2015 Development Agenda should also reaffirm the Rio Principles, especially the principle of common but differentiated responsibilities, the right to development and equity, and mutual accountability and responsibility, as well as ensure policy space for nationally tailored policies and programmes on the continent, including appropriate support for the implementation of the NEPAD

    E-Government Applications And Methodologies: Turkey on the E-Government Way

    Get PDF
    The recent changes in the technology, especially the use of Internet and the World Wide Web resulted in a new way of doing business for the governments. Governments worldwide face with the challenge of transformation and the need to reinvent government systems, which are based to deliver more efficient and cost effective services for the citizens. The developments and the studies in Information and Communication Technologies (ICT) resulted in E-Government projects and applications. This paper tries to analyze E-Government projects by analyzing their methodologies and strategies; and it is mainly based on the underlying key points in success stories. Also within this paper the reader will get information on E-Government projects in Turkey, successes and failures, IT vision of the administrations and the future plans.

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs

    The social negotiation of fitness for work: tensions in doctor-patient relationships over medical certification of chronic pain

    Get PDF
    The UK government is promoting the health benefits of work, in order to change doctors' and patients' behaviour and reduce sickness absence. The rationale is that many people 'off sick' would have better outcomes by staying at work; but reducing the costs of health care and benefits is also an imperative. Replacement of the 'sick note' with the 'fit note' and a national educational programme are intended to reduce sickness-certification rates, but how will these initiatives impact on doctor-patient relationships and the existing tension between the doctor as patient advocate and gate-keeper to services and benefits? This tension is particularly acute for problems like chronic pain where diagnosis, prognosis and work capacity can be unclear. We interviewed 13 doctors and 30 chronic pain patients about their experiences of negotiating medical certification for work absence and their views of the new policies. Our findings highlight the limitations of naĂŻve rationalist approaches to judgements of work absence and fitness for work for people with chronic pain. Moral, socio-cultural and practical factors are invoked by doctors and patients to contest decisions, and although both groups support the fit note's focus on capacity, they doubt it will overcome tensions in the consultation. Doctors value tacit skills of persuasion and negotiation that can change how patients conceptualise their illness and respond to it. Policy-makers increasingly recognise the role of this tacit knowledge and we conclude that sick-listing can be improved by further developing these skills and acknowledging the structural context within which protagonists negotiate sick-listin
    • …
    corecore