8,787 research outputs found
ClouNS - A Cloud-native Application Reference Model for Enterprise Architects
The capability to operate cloud-native applications can generate enormous
business growth and value. But enterprise architects should be aware that
cloud-native applications are vulnerable to vendor lock-in. We investigated
cloud-native application design principles, public cloud service providers, and
industrial cloud standards. All results indicate that most cloud service
categories seem to foster vendor lock-in situations which might be especially
problematic for enterprise architectures. This might sound disillusioning at
first. However, we present a reference model for cloud-native applications that
relies only on a small subset of well standardized IaaS services. The reference
model can be used for codifying cloud technologies. It can guide technology
identification, classification, adoption, research and development processes
for cloud-native application and for vendor lock-in aware enterprise
architecture engineering methodologies
Patterns and Interactions in Network Security
Networks play a central role in cyber-security: networks deliver security
attacks, suffer from them, defend against them, and sometimes even cause them.
This article is a concise tutorial on the large subject of networks and
security, written for all those interested in networking, whether their
specialty is security or not. To achieve this goal, we derive our focus and
organization from two perspectives. The first perspective is that, although
mechanisms for network security are extremely diverse, they are all instances
of a few patterns. Consequently, after a pragmatic classification of security
attacks, the main sections of the tutorial cover the four patterns for
providing network security, of which the familiar three are cryptographic
protocols, packet filtering, and dynamic resource allocation. Although
cryptographic protocols hide the data contents of packets, they cannot hide
packet headers. When users need to hide packet headers from adversaries, which
may include the network from which they are receiving service, they must resort
to the pattern of compound sessions and overlays. The second perspective comes
from the observation that security mechanisms interact in important ways, with
each other and with other aspects of networking, so each pattern includes a
discussion of its interactions.Comment: 63 pages, 28 figures, 56 reference
InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services
Cloud computing providers have setup several data centers at different
geographical locations over the Internet in order to optimally serve needs of
their customers around the world. However, existing systems do not support
mechanisms and policies for dynamically coordinating load distribution among
different Cloud-based data centers in order to determine optimal location for
hosting application services to achieve reasonable QoS levels. Further, the
Cloud computing providers are unable to predict geographic distribution of
users consuming their services, hence the load coordination must happen
automatically, and distribution of services must change in response to changes
in the load. To counter this problem, we advocate creation of federated Cloud
computing environment (InterCloud) that facilitates just-in-time,
opportunistic, and scalable provisioning of application services, consistently
achieving QoS targets under variable workload, resource and network conditions.
The overall goal is to create a computing environment that supports dynamic
expansion or contraction of capabilities (VMs, services, storage, and database)
for handling sudden variations in service demands.
This paper presents vision, challenges, and architectural elements of
InterCloud for utility-oriented federation of Cloud computing environments. The
proposed InterCloud environment supports scaling of applications across
multiple vendor clouds. We have validated our approach by conducting a set of
rigorous performance evaluation study using the CloudSim toolkit. The results
demonstrate that federated Cloud computing model has immense potential as it
offers significant performance gains as regards to response time and cost
saving under dynamic workload scenarios.Comment: 20 pages, 4 figures, 3 tables, conference pape
CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines
Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective.
The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines.
From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research
Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)
Virtual Location-Based Services: Merging the Physical and Virtual World
Location-based services gained much popularity through providing users with
helpful information with respect to their current location. The search and
recommendation of nearby locations or places, and the navigation to a specific
location are some of the most prominent location-based services. As a recent
trend, virtual location-based services consider webpages or sites associated
with a location as 'virtual locations' that online users can visit in spite of
not being physically present at the location. The presence of links between
virtual locations and the corresponding physical locations (e.g., geo-location
information of a restaurant linked to its website), allows for novel types of
services and applications which constitute virtual location-based services
(VLBS). The quality and potential benefits of such services largely depends on
the existence of websites referring to physical locations. In this paper, we
investigate the usefulness of linking virtual and physical locations. For this,
we analyze the presence and distribution of virtual locations, i.e., websites
referring to places, for two Irish cities. Using simulated tracks based on a
user movement model, we investigate how mobile users move through the Web as
virtual space. Our results show that virtual locations are omnipresent in urban
areas, and that the situation that a user is close to even several such
locations at any time is rather the normal case instead of the exception
A Web-Based Atlas of Environmental Justice for Coachella Valley, Southern California
The US Environmental Protection Agency (2014) defines environmental justice as “the fair treatment and meaningful involvement of all people regardless of race, color, national origin, or income with respect to the development, implementation, and enforcement of environmental laws, regulations, and policies.” Environmental issues caused by human practices affect human life in numerous ways. As a result, different regions exhibit varying interactions between the environment and the corresponding human practices. The lack of an adequate communication medium for the existing environmental justice issues has left the residents of Coachella Valley with unattended and overlooked environmental hazards. Although the victims are aware of the problems, other members of the society and government agencies need to realize the effects of the deadly hazards on the Valley residents. This project examined the vulnerability of different communities to environmental hazards based on their linguistic, ethnic, and racial diversities. To target a broader audience, GIS and Web technologies have proven to be effective in exploring the spatial interactions between residents and geographic contexts. Thus, the project adapted an interactive Web-based solution to enable visualization of the spatial patterns between environmental and social factors. Considering the environmental factors, including pesticide use, water distribution, housing, green spaces, and waste facilities and dumpsites, an interactive Web application was developed using ArcGIS API for JavaScript
Geographic Information Systems and Risk Assessment
This report presents projects developed by the Unit IPSC/SERAC regarding the use of Geographic Information Systems (GIS) for supporting the study of critical infrastructures and the security/defence industry. It also discusses how risk assessment can benefit from geographical representations. Risk assessments have an important spatial component and GIS can be central to risk identification, quantification, and evaluation. Furthermore it presents a wide-ranging description of different GIS techniques and web-technologies, and its potential application to supporting the European Program for Critical Infrastructure Protection, and the mapping of the European Defence industry.JRC.G.6-Sensors, radar technologies and cybersecurit
- …