421,384 research outputs found

    Above the trust and security in cloud computing : a notion towards innovation

    Full text link
    While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges are like on demand scalability and infinite resource provisioning as per the `pay-as-you-go\u27 manner in favour of a single information owner (abbreviated as INO from now onwards) to multiple corporate INOs. While outsourcing information to a cloud storage controlled by a cloud service provider (abbreviated as CSP from now onwards) relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved. This paper perspicaciously delves into the facts of the Cloud Computing security issues and aims to explore and establish a secure channel for the INO to communicate with the CSP while maintaining trust and confidentiality. The objective of the paper is served by analyzing different protocols and proposing the one in commensurate with the requirement of the security property like information or data confidentiality along the line of security in Cloud Computing Environment (CCE). To the best of our knowledge, we are the first to derive a secure protocol by successively eliminating the dangling pitfalls that remain dormant and thereby hamper confidentiality and integrity of information that is worth exchanging between the INO and the CSP. Besides, conceptually, our derived protocol is compared with the SSL from the perspectives of work flow related activities along the line of secure trusted path for information confidentiality.<br /

    PROTECTING THE USER DATA IN THE CLOUD USING FAST VERIFIABLE MULTIPLE PATTERN MATCHING ALGORITHM

    Get PDF
    An estimations as-a-Service existing by cloud star resources for see a paid office that associate with relationship to re-sensible their hypnotizing numbers to be direct on killed issue composed able. In this organization, to proposal a cloud-based suspend plot that allows the information owner to profit by the work natural factor existing by the CSP and sketch in slippery essential trust flank by them. To prearranged blueprint has four crucial skin break out of thought: (I) it award the beginning to re-sensible fragile information to a CSP, and execute included quadrangle stage amazing strategy on the rethought information, i.e., block change, mix, fixing, and add, (ii) it ensure that demand customers get the most current grouping of the re-appropriated in progression, (iii) it interfaces with malicious split trust among the dynamic and the CSP, and (iv) it allows the owner to yield or contradict declaration to the re-appropriated limit. To explicit the customer managing the information into the cloud, for security gauges purposes going before entering the information into the cloud that information will teach and that will be controlled in the cloud. So when the customer is entering for unambiguous confirmation these progression decisions accomplish on the prearranged relationship of in gathering. A stream sign buddy contains an assortment of last part laborers. It has titanic reach creation with association extra than the Internet. Clearly when the cutoff is manage in the cloud, by then the procurer confirmation have no circumstance on that information around by at that most elevated point and therefore avow the appropriateness of the component blend aslant in obscurity is an unsafe concern. It fulfillment of the constituent article aslant in cloud is limited alert in gathering owner. It uses to be described commitment for change the agreement and this join experiences introduction is centered around in the cloud

    A Real Time Approach to Theft Prevention in the field of Transportation System

    Get PDF
    This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable

    Other People\u27s Money: The Effects of Ownership on Compensation Strategy and Executive Pay

    Get PDF
    In this paper we develop and test hypotheses based on agency theory and managerial capitalism to address the question of whether firms\u27 compensation strategies are designed to motivate actions in the interests of equity holders or those of management. We examined differences in the organizational incentive structure of lower-level executives in management-controlled, owner controlled, and owner-managed firms. We found that when managers controlled the firm, there was pervasively weak incentive alignment for managers within the hierarchy and that, beyond base pay, they were able to extract compensation premiums through bonuses and long-term incentives, in spite of the fact that their firms did not demonstrate better economic performance than other types of firms. We were also able to demonstrate that equity holders pay substantial agency costs in management-controlled firms compared with owner-controlled firms. We end with a discussion of the organizational context for rationalizing executive compensation and the role of compensation consultants

    A conceptual model of service exchange in service-dominant logic

    Get PDF
    The service system is the basic abstraction of Service Science. This paper proposes the Resource-Service-System model as a conceptual model of service systems interacting in service exchanges, assuming a service-dominant logic economic worldview. The paper explains how the model was developed starting from the Resource-Event-Agent business model ontology, taking into account insights gained from studying Service Science literature and existing service ontologies. The paper also explains how different model views can contribute to study various aspects of service systems and exchanges

    Origin of CEO and Compensation Strategy: Differences between Insiders and Outsiders

    Get PDF
    Increasingly, U.S. firms are hiring their new CEOs from outside the firms. This study investigates the differences in compensation between outsider CEOs and insider CEOs from three dimensions: pay level, pay and performance link, and pay mix. Our analyses show: (1) outsider CEOs are paid more than insider CEOs, (2) pay and performance link is very weak for outsider CEOs, and (3) compensation package for outsider CEOs emphasizes the use of stock options. While several factors (e.g., firm size, firm performance, CEO tenure, ownership structure) influence insider CEOs\u27 pay, firm size is the only determinant of outsider CEOs\u27 pay. Our results suggest we will be able to understand CEO compensation more accurately if we analyze CEOs from different origins (insiders, outsiders, founders) separately

    Practical Schemes For Privacy & Security Enhanced RFID

    Full text link
    Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.Comment: 18 page

    Do External Auditors Perform a Corporate Governance Role in Emerging Markets? Evidence from East Asia

    Full text link
    In emerging markets, the concentration of corporate ownership has created agency conflicts between controlling owners and minority shareholders. Conventional corporate control mechanisms such as boards of directors and takeovers are typically weak in containing the agency problem. This study examines whether external independent auditors could be employed as monitors and as bonding mechanisms to alleviate the agency conflict. Using a broad sample of firms from eight East Asian economies, we document that firms are more likely to employ Big Five auditors when they are more subject to the agency problem imbedded in their ultimate ownership structure. One possible reason that this documented relation between auditor choice and the agency problem is more evident than the inconsistent results using U.S. and U.K. data is that alternative governance mechanisms are limited in East Asia. In addition, among East Asian auditees subject to the agency problem, Big Five auditors charge a higher fee and set a lower audit modification threshold while non-Big Five auditors do not. Taken together, the evidence suggests that Big Five auditors in emerging markets do have a corporate governance role.http://deepblue.lib.umich.edu/bitstream/2027.42/39784/3/wp400.pd

    Contributions to predicting contaminant leaching from secondary materials used in roads

    Get PDF
    Slags, coal ashes, and other secondary materials can be used in road construction. Both traditional and secondary materials used in roads may contain contaminants that may leach and pollute the groundwater. The goal of this research was to further the understanding of leaching and transport of contaminants from pavement materials. Towards this goal, a new probabilistic framework was introduced which provided a structured guidance for selecting the appropriate model, incorporating uncertainty, variability, and expert opinion, and interpreting results for decision making. In addition to the framework, specific contributions were made in pavement and embankment hydrology and reactive transport, Bayesian statistics, and aqueous geochemistry of leaching. Contributions on water movement and reactive transport in highways included probabilistic prediction of leaching in an embankment, and scenario analyses of leaching and transport in pavements using HYDRUS2D, a contaminant fate and transport model. Water flow in a Minnesota highway embankment was replicated by Bayesian calibration of hydrological parameters against water content data. Extent of leaching of Cd from a coal fly ash was estimated. Two dimensional simulations of various scenarios showed that salts in the base layer of pavements are depleted within the first year whereas the metals may never reach the groundwater if the pavement is built on adsorbing soils. Aqueous concentrations immediately above the groundwater estimated for intact and damaged pavements can be used for regulators to determine the acceptability of various recycled materials. Contributions in the aqueous geochemistry of leaching included a new modeling approach for leaching of anions and cations from complex matrices such as weathered steel slag. The novelty of the method was its simultaneous inclusion of sorption and solubility controls for multiple analytes. The developed model showed that leaching of SO4, Cr, As, Si, Ca, Mg, and V were controlled by corresponding soluble solids. Leaching of Pb was controlled by Pb(VO4)3 solubility at low pHs and by surface precipitation reactions at high pHs. Leaching of Cd and Zn were controlled by surface complexation and surface precipitation, respectively
    • …
    corecore