2,003 research outputs found

    Resilient Critical Infrastructure Management using Service Oriented Architecture

    No full text
    Abstract—The SERSCIS project aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly demonstrated by ‘Airport Collaborative Decision Making’ (ACDM). Failure or underperformance of any of the interlinked ICT systems may compromise the ability of airports to plan their use of resources to sustain high levels of air traffic, or to provide accurate aircraft movement forecasts to the wider European air traffic management systems. The proposed solution is to introduce further SERSCIS ICT components to manage dependability and interdependency. These use semantic models of the critical infrastructure, including its ICT services, to identify faults and potential risks and to increase human awareness of them. Semantics allows information and services to be described in such a way that makes them understandable to computers. Thus when a failure (or a threat of failure) is detected, SERSCIS components can take action to manage the consequences, including changing the interdependency relationships between services. In some cases, the components will be able to take action autonomously — e.g. to manage ‘local’ issues such as the allocation of CPU time to maintain service performance, or the selection of services where there are redundant sources available. In other cases the components will alert human operators so they can take action instead. The goal of this paper is to describe a Service Oriented Architecture (SOA) that can be used to address the management of ICT components and interdependencies in critical infrastructure systems. Index Terms—resilience; QoS; SOA; critical infrastructure, SLA

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    Dynamic properties of language anxiety

    Get PDF
    This article begins by examining previous empirical studies to demonstrate that language anxiety, or the negative emotional reaction learners experience when using a second language (MacIntyre & Gardner, 1999), is a dynamic individual difference learner variable. I show that it forms part of an interconnected, constantly-in-flux system that changes unpredictably over multiple time scales. While at certain times this system might settle into an attractor state that accommodates contradictory conditions, perturbations that arise may lead to development and change with the curious possibility that minor disruptions generate large effects while major alterations go unnoticed. In essence, language anxiety (LA) is part of a continuous complex system in which each state evolves from a previous one. After I establish LA as a dynamic variable using the aforementioned criteria, I outline the implications and challenges for researching LA using a dynamic paradigm, which include focusing on individuals, transforming LA research questions, designing interventions and re-thinking data gathering methodologies. I conclude with implications for language teaching that emphasize: 1) raising awareness of the importance of decoding nonverbal behavior to identify moment-by-moment shifts in learner emotion; 2) remaining vigilant concerning variables that are interacting with LA that make this factor part of a cyclical process; 3) understanding that anxiety co-exists with positive emotions to varying degrees and that language tasks are not unanimously enjoyed or universally anxiety-provoking; and 4) incorporating positive psychology activities that proactively encourage buoyancy and resilience for moment-by-moment daily perturbations as well as debilitating disruptions that result in long-lasting influences

    Secure data sharing and processing in heterogeneous clouds

    Get PDF
    The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and processes. The public sector, however, lacks the necessary technology to enable effective, interoperable and secure integration of a multitude of its computing clouds and services. In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities. We investigate the aspects of access control, data and security policy languages, as well as cryptographic approaches that enable fine-grained security and data processing in semi-trusted environments. We identify the main challenges and frame the future work that serve as an enabler of interoperability among heterogeneous infrastructures and services. Our goal is to enable both security and legal conformance as well as to facilitate transparency, privacy and effectivity of private cloud federations for the public sector needs. © 2015 The Authors

    Service Level Agreements in Cloud Computing and Big Data

    Get PDF
    Now-a-days Most of the industries are having large volumes of data. Data has range of Tera bytes to Peta byte. Organizations are looking to handle the growth of data. Enterprises are using cloud deployments to address the big data and analytics with respect to the interaction between cloud and big data. This paper presents big data issues and research directions towards the ongoing work of processing of big data in the distributed environments

    Towards Automated PKI Trust Transfer for IoT

    Full text link
    IoT deployments grow in numbers and size and questions of long time support and maintainability become increasingly important. To prevent vendor lock-in, standard compliant capabilities to transfer control of IoT devices between service providers must be offered. We propose a lightweight protocol for transfer of control, and we show that the overhead for the involved IoT devices is small and the overall required manual overhead is minimal. We analyse the fulfilment of the security requirements to verify that the stipulated requirements are satisfied.Comment: Accepted at 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). 8 pages, 4 figure

    Introduction to the Special Issue on Sustainable Solutions for the Intelligent Transportation Systems

    Get PDF
    The intelligent transportation systems improve the transportation system’s operational efficiency and enhance its safety and reliability by high-tech means such as information technology, control technology, and computer technology. In recent years, sustainable development has become an important topic in intelligent transportation’s development, including new infrastructure and energy distribution, new energy vehicles and new transportation systems, and the development of low-carbon and intelligent transportation equipment. New energy vehicles’ development is a significant part of green transportation, and its automation performance improvement is vital for smart transportation. The development of intelligent transportation and green, low-carbon, and intelligent transportation equipment needs to be promoted, a significant feature of transportation development in the future. For intelligent infrastructure and energy distribution facilities, the electricity for popular electric vehicles and renewable energy, such as nuclear power and hydrogen power, should be considered

    Trustworthy autonomic architecture (TAArch): Implementation and empirical investigation

    Get PDF
    This paper presents a new architecture for trustworthy autonomic systems. This trustworthy autonomic architecture is different from the traditional autonomic computing architecture and includes mechanisms and instrumentation to explicitly support run-time self-validation and trustworthiness. The state of practice does not lend itself robustly enough to support trustworthiness and system dependability. For example, despite validating system's decisions within a logical boundary set for the system, there’s the possibility of overall erratic behaviour or inconsistency in the system emerging for example, at a different logical level or on a different time scale. So a more thorough and holistic approach, with a higher level of check, is required to convincingly address the dependability and trustworthy concerns. Validation alone does not always guarantee trustworthiness as each individual decision could be correct (validated) but overall system may not be consistent and thus not dependable. A robust approach requires that validation and trustworthiness are designed in and integral at the architectural level, and not treated as add-ons as they cannot be reliably retro-fitted to systems. This paper analyses the current state of practice in autonomic architecture, presents a different architectural approach for trustworthy autonomic systems, and uses a datacentre scenario as the basis for empirical analysis of behaviour and performance. Results show that the proposed trustworthy autonomic architecture has significant performance improvement over existing architectures and can be relied upon to operate (or manage) almost all level of datacentre scale and complexity

    EFFICIENT AND FLEXIBLE MANAGEMENT OF ENTERPRISE INFORMATION SYSTEMS

    Get PDF
    The growing awareness of the substantial environmental footprint of Information System has increasingly focused corporate transformation efforts on the efficient usage of Information Technology. In this context, we provide a new concept to enterprise IS operation and introduce a novel adaptation framework that harmonizes operational requirements with efficiency goals. We concretely target elastic n-tier applications with dynamic on-demand resource provisioning for component servers and implement an adaptation engine prototype. Our framework forecasts future user behavior, analyzes the impact of workload on system performance, evaluates the economic impact of different provisioning strategies, and derives an optimal operation strategy. More generally, our adaptation engine optimizes IT system operation based on a holistic evaluation of the key factors of influence. In the evaluation, we systematically investigate practicability, optimization potential, as well as effectiveness. Additionally, we show that our framework allows flexible IS operation with up to a 40 percent lower cost of operation
    • 

    corecore