41,839 research outputs found
The Knowledge of the Grid: A Grid Ontology
This paper presents a knowledge architecture and set of ontologies that can be used as the foundation to facilitate the matching of abstract resource requests to services and resources, to determine the functional equivalence of Grid middle wares and deployments and to allow the description of âhybridâ compound Grids composed of individual heterogeneous Grids. This is necessary as in all these cases what is required is mediation between diïŹerent views or descriptions of Grids, which requires a formal reference vocabulary. We present a framework and ontologies for achieving this
Human Values as the Basis for Sustainable Information System Design
Information systems (IS) play an increasing role for individual well-being [3], for the environment [4], and for society at large [5]. Considering sustainability in IS development is therefore becoming paramount. However, companies today associate sustainability with extra cost and burden on their operations. As a result, many view sustainability more as a demand and a challenge rather than an opportunity. In this article, we argue that companies should rethink this attitude, as both sustainability and a business model can be understood as deeply rooted in human values
The Role of International Rules in Blockchain-Based Cross-Border Commercial Disputes
[excerpt] The concept of online dispute resolution (ODR) is not new. 1 But, with the advent of Web 3.0, the distributed web that facilitates pseudonymous and cross-border transactions via blockchain\u27s distributed ledger technology, 2 the idea of, and pressing need for, appropriate dispute resolution models for blockchain-based disputes to support this novel system of distributed consensus and trust of which blockchain proponents boast, is a primary concern in rapid development. 3 The common goal of each project is to utilize smart contracts to facilitate superior, quicker[,] and less expensive proceedings by eliminating so many of the tedious and protracted trappings of traditional arbitral proceedings, such as the sending and receiving of documents via courier. , Despite myriad approaches, all emerging blockchain-based dispute resolution services (BDR solutions) generally seek to bridge the divide between automated performance mechanisms, like smart contracts, and the human judgment traditionally required to settle legal disputes.5
How our existing legal frameworks must develop to ensure that smart contracts 6 facilitate, rather than frustrate, the parties\u27 intent is a critically important question to ask as the blockchain stack\u27s infrastructure and application layers are being built and, ultimately, scaled. Indeed, interest is high in the race to create alternative dispute resolution mechanisms to resolve disputes arising from blockchain-based commercial transactions that, due to the transnational, borderless, pseudonymous, and distributed nature of blockchain, clearly necessitate international solutions.
Data DNA: The Next Generation of Statistical Metadata
Describes the components of a complete statistical metadata system and suggests ways to create and structure metadata for better access and understanding of data sets by diverse users
The case for cloud service trustmarks and assurance-as-a-service
Cloud computing represents a significant economic opportunity for Europe. However, this growth is threatened by adoption barriers largely related to trust. This position paper examines trust and confidence issues in cloud computing and advances a case for addressing them through the implementation of a novel trustmark scheme for cloud service providers. The proposed trustmark would be both active and dynamic featuring multi-modal information about the performance of the underlying cloud service. The trustmarks would be informed by live performance data from the cloud service provider, or ideally an independent third-party accountability and assurance service that would communicate up-to-date information relating to service performance and dependability. By combining assurance measures with a remediation scheme, cloud service providers could both signal dependability to customers and the wider marketplace and provide customers, auditors and regulators with a mechanism for determining accountability in the event of failure or non-compliance. As a result, the trustmarks would convey to consumers of cloud services and other stakeholders that strong assurance and accountability measures are in place for the service in question and thereby address trust and confidence issues in cloud computing
Chemical applications of escience to interfacial spectroscopy
This report is a summary of works carried out by the author between October 2003 and September 2004, in the first year of his PhD studie
UMTS broadband mobile technology is a reality â Confounding many expectations
Contrary to the negative public perception, third-generation (3G) broadband mobile telecommunication, aka UMTS, has become reality. UMTS networks have been rolled out above all in Central Europe. The take-up of UMTS differs sharply from one country to the next, though. The large differences are due not only to market-related factors and differing marketing strategies, but also to political intervention that distorts the market. At present, content providers, handset makers and telcos are working feverishly to produce UMTS-based supplementary offerings. For the sluggish demand for mobile broadband services still harbours a big risk for the entire telecommunications sector.information an communications technology; telecommunications; 3G; broadband
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
It has been assumed that the physical separation (air-gap) of computers
provides a reliable level of security, such that should two adjacent computers
become compromised, the covert exchange of data between them would be
impossible. In this paper, we demonstrate BitWhisper, a method of bridging the
air-gap between adjacent compromised computers by using their heat emissions
and built-in thermal sensors to create a covert communication channel. Our
method is unique in two respects: it supports bidirectional communication, and
it requires no additional dedicated peripheral hardware. We provide
experimental results based on implementation of BitWhisper prototype, and
examine the channel properties and limitations. Our experiments included
different layouts, with computers positioned at varying distances from one
another, and several sensor types and CPU configurations (e.g., Virtual
Machines). We also discuss signal modulation and communication protocols,
showing how BitWhisper can be used for the exchange of data between two
computers in a close proximity (at distance of 0-40cm) at an effective rate of
1-8 bits per hour, a rate which makes it possible to infiltrate brief commands
and exfiltrate small amount of data (e.g., passwords) over the covert channel
Options for Securing RTP Sessions
The Real-time Transport Protocol (RTP) is used in a large number of
different application domains and environments. This heterogeneity
implies that different security mechanisms are needed to provide
services such as confidentiality, integrity, and source
authentication of RTP and RTP Control Protocol (RTCP) packets
suitable for the various environments. The range of solutions makes
it difficult for RTP-based application developers to pick the most
suitable mechanism. This document provides an overview of a number
of security solutions for RTP and gives guidance for developers on
how to choose the appropriate security mechanism
Solutions for IPv6-based mobility in the EU project MobyDick
Proceedings of the WTC 2002, 18th World Telecommunications Congress, Paris, France, 22 -27 September, 2002.Mobile Internet technology is moving towards a packet-based or, more precisely, IPv6-based network. Current solutions on Mobile IPv6 and other related QoS and AAA matters do not offer the security and quality users have come to take for granted. The EU IST project Moby Dick has taken on the challenge of providing a solution that integrates QoS, mobility and AAA in a heterogeneous access environment. This paper focuses on the mobility part of the project, describes and justifies the handover approach taken, shows how QoS-aware and secure handover is achieved, and introduces the project's paging concept. It shows that a transition to a fully integrated IP-RAN and IP-Backbone has become a distinct option for the future.Publicad
- âŠ