41,839 research outputs found

    The Knowledge of the Grid: A Grid Ontology

    Get PDF
    This paper presents a knowledge architecture and set of ontologies that can be used as the foundation to facilitate the matching of abstract resource requests to services and resources, to determine the functional equivalence of Grid middle wares and deployments and to allow the description of ‘hybrid’ compound Grids composed of individual heterogeneous Grids. This is necessary as in all these cases what is required is mediation between diïŹ€erent views or descriptions of Grids, which requires a formal reference vocabulary. We present a framework and ontologies for achieving this

    Human Values as the Basis for Sustainable Information System Design

    Get PDF
    Information systems (IS) play an increasing role for individual well-being [3], for the environment [4], and for society at large [5]. Considering sustainability in IS development is therefore becoming paramount. However, companies today associate sustainability with extra cost and burden on their operations. As a result, many view sustainability more as a demand and a challenge rather than an opportunity. In this article, we argue that companies should rethink this attitude, as both sustainability and a business model can be understood as deeply rooted in human values

    The Role of International Rules in Blockchain-Based Cross-Border Commercial Disputes

    Get PDF
    [excerpt] The concept of online dispute resolution (ODR) is not new. 1 But, with the advent of Web 3.0, the distributed web that facilitates pseudonymous and cross-border transactions via blockchain\u27s distributed ledger technology, 2 the idea of, and pressing need for, appropriate dispute resolution models for blockchain-based disputes to support this novel system of distributed consensus and trust of which blockchain proponents boast, is a primary concern in rapid development. 3 The common goal of each project is to utilize smart contracts to facilitate superior, quicker[,] and less expensive proceedings by eliminating so many of the tedious and protracted trappings of traditional arbitral proceedings, such as the sending and receiving of documents via courier. , Despite myriad approaches, all emerging blockchain-based dispute resolution services (BDR solutions) generally seek to bridge the divide between automated performance mechanisms, like smart contracts, and the human judgment traditionally required to settle legal disputes.5 How our existing legal frameworks must develop to ensure that smart contracts 6 facilitate, rather than frustrate, the parties\u27 intent is a critically important question to ask as the blockchain stack\u27s infrastructure and application layers are being built and, ultimately, scaled. Indeed, interest is high in the race to create alternative dispute resolution mechanisms to resolve disputes arising from blockchain-based commercial transactions that, due to the transnational, borderless, pseudonymous, and distributed nature of blockchain, clearly necessitate international solutions.

    Data DNA: The Next Generation of Statistical Metadata

    Get PDF
    Describes the components of a complete statistical metadata system and suggests ways to create and structure metadata for better access and understanding of data sets by diverse users

    The case for cloud service trustmarks and assurance-as-a-service

    Get PDF
    Cloud computing represents a significant economic opportunity for Europe. However, this growth is threatened by adoption barriers largely related to trust. This position paper examines trust and confidence issues in cloud computing and advances a case for addressing them through the implementation of a novel trustmark scheme for cloud service providers. The proposed trustmark would be both active and dynamic featuring multi-modal information about the performance of the underlying cloud service. The trustmarks would be informed by live performance data from the cloud service provider, or ideally an independent third-party accountability and assurance service that would communicate up-to-date information relating to service performance and dependability. By combining assurance measures with a remediation scheme, cloud service providers could both signal dependability to customers and the wider marketplace and provide customers, auditors and regulators with a mechanism for determining accountability in the event of failure or non-compliance. As a result, the trustmarks would convey to consumers of cloud services and other stakeholders that strong assurance and accountability measures are in place for the service in question and thereby address trust and confidence issues in cloud computing

    Chemical applications of escience to interfacial spectroscopy

    No full text
    This report is a summary of works carried out by the author between October 2003 and September 2004, in the first year of his PhD studie

    UMTS broadband mobile technology is a reality – Confounding many expectations

    Get PDF
    Contrary to the negative public perception, third-generation (3G) broadband mobile telecommunication, aka UMTS, has become reality. UMTS networks have been rolled out above all in Central Europe. The take-up of UMTS differs sharply from one country to the next, though. The large differences are due not only to market-related factors and differing marketing strategies, but also to political intervention that distorts the market. At present, content providers, handset makers and telcos are working feverishly to produce UMTS-based supplementary offerings. For the sluggish demand for mobile broadband services still harbours a big risk for the entire telecommunications sector.information an communications technology; telecommunications; 3G; broadband

    BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations

    Full text link
    It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible. In this paper, we demonstrate BitWhisper, a method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert communication channel. Our method is unique in two respects: it supports bidirectional communication, and it requires no additional dedicated peripheral hardware. We provide experimental results based on implementation of BitWhisper prototype, and examine the channel properties and limitations. Our experiments included different layouts, with computers positioned at varying distances from one another, and several sensor types and CPU configurations (e.g., Virtual Machines). We also discuss signal modulation and communication protocols, showing how BitWhisper can be used for the exchange of data between two computers in a close proximity (at distance of 0-40cm) at an effective rate of 1-8 bits per hour, a rate which makes it possible to infiltrate brief commands and exfiltrate small amount of data (e.g., passwords) over the covert channel

    Options for Securing RTP Sessions

    Get PDF
    The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism

    Solutions for IPv6-based mobility in the EU project MobyDick

    Get PDF
    Proceedings of the WTC 2002, 18th World Telecommunications Congress, Paris, France, 22 -27 September, 2002.Mobile Internet technology is moving towards a packet-based or, more precisely, IPv6-based network. Current solutions on Mobile IPv6 and other related QoS and AAA matters do not offer the security and quality users have come to take for granted. The EU IST project Moby Dick has taken on the challenge of providing a solution that integrates QoS, mobility and AAA in a heterogeneous access environment. This paper focuses on the mobility part of the project, describes and justifies the handover approach taken, shows how QoS-aware and secure handover is achieved, and introduces the project's paging concept. It shows that a transition to a fully integrated IP-RAN and IP-Backbone has become a distinct option for the future.Publicad
    • 

    corecore