12,378 research outputs found
Towards business integration as a service 2.0 (BIaaS 2.0)
Cloud Computing Business Framework (CCBF) is a framework for designing and implementation of Could Computing solutions. This proposal focuses on how CCBF can help to address linkage in Cloud Computing implementations. This leads to the development of Business Integration as a Service 1.0 (BIaaS 1.0) allowing different services, roles and functionalities to work together in a linkage-oriented framework where the outcome of one service can be input to another, without the need to translate between domains or languages. BIaaS 2.0 aims to allow automation, enhanced security, advanced risk modelling and improved collaboration between processes in BIaaS 1.0. The benefits from adopting BIaaS 1.0 and developing BIaaS 2.0 are illustrated using a case study from the University of Southampton and several collaborators including IBM US. BIaaS 2.0 can work with mainstream technologies such as scientific workflows, and the proposal and demonstration of BIaaS 2.0 will be aimed to certainly benefit industry and academia. © 2011 IEEE
Recommended from our members
Micromagnetic simulation of magnetofossils with realistic size and shape distributions: Linking magnetic proxies with nanoscale observations and implications for magnetofossil identification
We build micromagnetic models to investigate the magnetic properties of biogenic magnetite - a common type of magnetic minerals that is responsible for recording a wide range of biological, geophysical and geological processes on earth. The geometry of modelled particles is based on realistic size and shape distributions from nanoscale observations. Systematic changes in microstructures of biogenic magnetite ensembles are built and their magnetic properties are calculated, which enables a quantitative and separate assessment of the effect of crystal morphology and chain structures. Although the same particle size and shape distributions are used in all calculations, simulation results document large variations in magnetic properties, i.e., wide distributions of coercivity (Bc = ~10-60 mT), coercivity of remanence (Bcr = ~14-81 mT), dispersion parameter (DP = ~0.1-0.5), and skewness values (S = ~0.7-1.1) due to variable degree of anisotropy and magnetostatic interactions. Previously, the commonly observed "biogenic soft" and "biogenic hard" components on biogenic magnetite-bearing samples were often interpreted to reflect crystal morphologies, and that the small DP values of coercivity distributions were an indication of narrow particle size distributions. Our simulations suggest that these speculations are not always the case and that magnetosome microstructures likely exert a dominant control over their magnetic properties. Our modelling results provide a new theoretical perspective on the magnetic properties of biogenic magnetite, which is important for understanding magnetic proxy signals from magnetofossils in a wide range of environmental and geological settings, and for the search for biogenic magnetite in terrestrial rocks and in extra-terrestrial materials.European Research Counci
The second international workshop on enterprise security
Welcome to our second international workshop on Enterprise Security as part of CloudCom 2015, Vancouver, Canada, November 30-December 3, 2015. The first international workshop held in Singapore has been a major success since then we have achieved greater team activities, research, and international collaborations as the major and significant outcome of our first workshop on this topic. Enterprise Security involves all business, products, governments, organization, and their contractors. This also includes research areas of information security, software security, computer security, cloud security, IoT security, data and big data security. This workshop provides a significant contribution from experts on some of the following key research areas:* Incident response Systems Security - This involves many organisations are outsourcing computer operations to third parties, and the next logical step is to outsource management of computer security incidents as well.* Cloud Security Assurance Model - Defining proper measures for evaluating the effectiveness of an assurance model, which we have developed to ensure cloud security, is vital to ensure the successful implementation and continued running of the model. We need to understand that with security being such an essential component of business processes, responsibility must lie with the board.* Cloud Security - The development of cloud computing and the vast use of its services poses significant security and privacy concerns to the people and the organizations relying on these services. Diversification and obfuscation approaches are of the most promising proactive techniques that protect computers from harmful malware, by preventing them to take advantage of the security vulnerabilities. Mission critical applications are limited in the cloud as it has various security issues. As the data size are being increased gradually and the difficulty in storing, retrieving and managing data makes the application to move into cloud.* Cloud Forensics & Cryptanalysis and Enhancement - Password based authentication has been used extensively as a one of the most appropriate authentication techniques.* Validating technology and BI Techniques â This is useful for organizations to understand their status with return and risk. They can evaluate their security policies and technologies regularly.* Risk Analysis and Big Data â This is increasingly important for organizations since they deal with growing amount of data, dependency and complexity. Risk analysis can be applied to many areas related or outside cloud computing.We are pleased to receive 24 papers from researchers of 12 different countries. After the vigorous review process and careful considerations, 11 papers have been selected, with 5 full papers and 6 short papers. We have offered two prize awards. One award is to award the best paper in the information system category. The other award is to award the best paper in the computational category. Each winner can be invited to International Journal of Information Management (IJIM) and Future Generation Computer Systems (FGCS). Another good news we have is that extended version of conference papers and other security/risk researchers can contribute to our Springer book scheduled to call for papers after our workshop. We are honoured to have Dr. Konstantin Beznosov to be our keynote speaker.Enterprise Security has been a popular topic since it includes cyber security, risk management, information security, Cloud and Forensic security, risk analysis and Big Data. It is an area that can make theory into practice and allow any organizations that adopt our recommendations to enjoy the benefits of enforced Enterprise Security. The outputs of our workshop can provide organizations with several useful recommendations, proofs-of-concepts and demonstrations to improve current security and risk practices.We hope the second international workshop will foster collaborations of projects, research publications and funding opportunities at the international setting in Vancouver, Canada.Workshop Organizing Committee would like to thank CloudCom organizers for their fullest support
An archival case study : revisiting the life and political economy of Lauchlin Currie
This paper forms part of a wider project to show the significance of archival material on distinguished economists, in this case Lauchlin Currie (1902-93), who studied and taught at Harvard before entering government service at the US Treasury and Federal Reserve Board as the intellectual leader of Roosevelt's New Deal, 1934-39, as FDR's White House economic adviser in peace and war, 1939-45, and as a post-war development economist. It discusses the uses made of the written and oral material available when the author was writing his intellectual biography of Currie (Duke University Press 1990) while Currie was still alive, and the significance of the material that has come to light after Currie's death
Editorial for FGCS special issue: Big Data in the cloud
Research associated with Big Data in the Cloud will be important topic over the next few years. The topic includes work on demonstrating architectures, applications, services, experiments and simulations in the Cloud to support the cases related to adoption of Big Data. A common approach to Big Data in the Cloud to allow better access, performance and efficiency when analysing and understanding the data is to deliver Everything as a Service. Organisations adopting Big Data this way find the boundaries between private clouds, public clouds and Internet of Things (IoT) can be very thin. Volume, variety, velocity, veracity and value are the major factors in Big Data systems but there are other challenges to be resolved. The papers of this special issue address a variety of issues and concerns in Big Data, including: searching and processing Big Data, implementing and modelling event and workflow systems, visualisation modelling and simulation and aspects of social media
A paradox of syntactic priming: why response tendencies show priming for passives, and response latencies show priming for actives
Speakers tend to repeat syntactic structures across sentences, a phenomenon called syntactic priming. Although it has been suggested that repeating syntactic structures should result in speeded responses, previous research has focused on effects in response tendencies. We investigated syntactic priming effects simultaneously in response tendencies and response latencies for active and passive transitive sentences in a picture description task. In Experiment 1, there were priming effects in response tendencies for passives and in response latencies for actives. However, when participants' pre-existing preference for actives was altered in Experiment 2, syntactic priming occurred for both actives and passives in response tendencies as well as in response latencies. This is the first investigation of the effects of structure frequency on both response tendencies and latencies in syntactic priming. We discuss the implications of these data for current theories of syntactic processing
- âŠ