483 research outputs found

    Towards business integration as a service 2.0 (BIaaS 2.0)

    Get PDF
    Cloud Computing Business Framework (CCBF) is a framework for designing and implementation of Could Computing solutions. This proposal focuses on how CCBF can help to address linkage in Cloud Computing implementations. This leads to the development of Business Integration as a Service 1.0 (BIaaS 1.0) allowing different services, roles and functionalities to work together in a linkage-oriented framework where the outcome of one service can be input to another, without the need to translate between domains or languages. BIaaS 2.0 aims to allow automation, enhanced security, advanced risk modelling and improved collaboration between processes in BIaaS 1.0. The benefits from adopting BIaaS 1.0 and developing BIaaS 2.0 are illustrated using a case study from the University of Southampton and several collaborators including IBM US. BIaaS 2.0 can work with mainstream technologies such as scientific workflows, and the proposal and demonstration of BIaaS 2.0 will be aimed to certainly benefit industry and academia. © 2011 IEEE

    The second international workshop on enterprise security

    Get PDF
    Welcome to our second international workshop on Enterprise Security as part of CloudCom 2015, Vancouver, Canada, November 30-December 3, 2015. The first international workshop held in Singapore has been a major success since then we have achieved greater team activities, research, and international collaborations as the major and significant outcome of our first workshop on this topic. Enterprise Security involves all business, products, governments, organization, and their contractors. This also includes research areas of information security, software security, computer security, cloud security, IoT security, data and big data security. This workshop provides a significant contribution from experts on some of the following key research areas:* Incident response Systems Security - This involves many organisations are outsourcing computer operations to third parties, and the next logical step is to outsource management of computer security incidents as well.* Cloud Security Assurance Model - Defining proper measures for evaluating the effectiveness of an assurance model, which we have developed to ensure cloud security, is vital to ensure the successful implementation and continued running of the model. We need to understand that with security being such an essential component of business processes, responsibility must lie with the board.* Cloud Security - The development of cloud computing and the vast use of its services poses significant security and privacy concerns to the people and the organizations relying on these services. Diversification and obfuscation approaches are of the most promising proactive techniques that protect computers from harmful malware, by preventing them to take advantage of the security vulnerabilities. Mission critical applications are limited in the cloud as it has various security issues. As the data size are being increased gradually and the difficulty in storing, retrieving and managing data makes the application to move into cloud.* Cloud Forensics & Cryptanalysis and Enhancement - Password based authentication has been used extensively as a one of the most appropriate authentication techniques.* Validating technology and BI Techniques – This is useful for organizations to understand their status with return and risk. They can evaluate their security policies and technologies regularly.* Risk Analysis and Big Data – This is increasingly important for organizations since they deal with growing amount of data, dependency and complexity. Risk analysis can be applied to many areas related or outside cloud computing.We are pleased to receive 24 papers from researchers of 12 different countries. After the vigorous review process and careful considerations, 11 papers have been selected, with 5 full papers and 6 short papers. We have offered two prize awards. One award is to award the best paper in the information system category. The other award is to award the best paper in the computational category. Each winner can be invited to International Journal of Information Management (IJIM) and Future Generation Computer Systems (FGCS). Another good news we have is that extended version of conference papers and other security/risk researchers can contribute to our Springer book scheduled to call for papers after our workshop. We are honoured to have Dr. Konstantin Beznosov to be our keynote speaker.Enterprise Security has been a popular topic since it includes cyber security, risk management, information security, Cloud and Forensic security, risk analysis and Big Data. It is an area that can make theory into practice and allow any organizations that adopt our recommendations to enjoy the benefits of enforced Enterprise Security. The outputs of our workshop can provide organizations with several useful recommendations, proofs-of-concepts and demonstrations to improve current security and risk practices.We hope the second international workshop will foster collaborations of projects, research publications and funding opportunities at the international setting in Vancouver, Canada.Workshop Organizing Committee would like to thank CloudCom organizers for their fullest support

    Editorial for FGCS special issue: Big Data in the cloud

    Get PDF
    Research associated with Big Data in the Cloud will be important topic over the next few years. The topic includes work on demonstrating architectures, applications, services, experiments and simulations in the Cloud to support the cases related to adoption of Big Data. A common approach to Big Data in the Cloud to allow better access, performance and efficiency when analysing and understanding the data is to deliver Everything as a Service. Organisations adopting Big Data this way find the boundaries between private clouds, public clouds and Internet of Things (IoT) can be very thin. Volume, variety, velocity, veracity and value are the major factors in Big Data systems but there are other challenges to be resolved. The papers of this special issue address a variety of issues and concerns in Big Data, including: searching and processing Big Data, implementing and modelling event and workflow systems, visualisation modelling and simulation and aspects of social media

    Synthesis, Structure and Stereodynamics of Atropisomeric <em>N</em>‑Chloroamides

    Get PDF
    Atropisomeric N-chloroamides were efficiently accessed by electrophilic halogenation of ortho-substituted secondary anilides. The stereodynamics of atropisomerism in these novel scaffolds was interrogated by detailed experimental and computational studies, revealing that racemization is correlated with amide isomerization. The stereoelectronic nature of the amide was shown to significantly influence racemization rates, with potentially important implications for other C-N atropisomeric scaffolds

    On the increase in thermal diffusivity caused by the perovskite to post-perovskite phase transition and its implications for mantle dynamics

    Get PDF
    The thermal diffusivity (κ) of perovskite and post-perovskite CaIrO3 has been measured, at elevated pressure and temperatures up to 600 °C, using the X-radiographic Ångström method. At high temperatures we find that the thermal diffusivity of post-perovskite is slightly below twice that of isochemical perovskite over the temperature range investigated. Assuming a similar effect occurs in MgSiO3 post-perovskite, the effect of the contrasting thermal transport properties between perovskite and post-perovskite on mantle dynamics has been investigated using simple two-dimensional convection models. These show a reduction in extent and increase in depth of post-perovskite lenses, as well as increased core–mantle-boundary heat-flux, broader upwellings and more vigorous downwellings when compared to the reference, constant a, case

    Lighting during grow-out and Salmonella in broiler flocks

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Lighting is used during conventional broiler grow-out to modify bird behaviour to reach the goals of production and improve bird welfare. The protocols for lighting intensity vary. In a field study, we evaluated if the lighting practices impact the burden of <it>Salmonella </it>in broiler flocks.</p> <p>Methods</p> <p>Conventional grow-out flocks reared in the states of Alabama, Mississippi and Texas, USA in 2003 to 2006 were sampled 1 week before harvest (<it>n </it>= 58) and upon arrival for processing (<it>n </it>= 56) by collecting feathered carcass rinsate, crop and one cecum from each of 30 birds, and during processing by collecting rinsate of 30 carcasses at pre-chilling (<it>n </it>= 56) and post-chilling points (<it>n </it>= 54). Litter samples and drag swabs of litter were collected from the grow-out houses after bird harvest (<it>n </it>= 56). Lighting practices for these flocks were obtained with a questionnaire completed by the growers. Associations between the lighting practices and the burden of <it>Salmonella </it>in the flocks were tested while accounting for variation between the grow-out farms, their production complexes and companies.</p> <p>Results</p> <p>Longer relative duration of reduced lights during the grow-out period was associated with reduced detection of <it>Salmonella </it>on the exterior of birds 1 week before harvest and on the broiler carcasses at the post-chilling point of processing. In addition, starting reduced lights for ≥18 hours per day later in the grow-out period was associated with decreased detection of <it>Salmonella </it>on the exterior of broilers arriving for processing and in the post-harvest drag swabs of litter from the grow-out house.</p> <p>Conclusions</p> <p>The results of this field study show that lighting practices implemented during broiler rearing can impact the burden of <it>Salmonella </it>in the flock. The underlying mechanisms are likely to be interactive.</p

    Two novel human cytomegalovirus NK cell evasion functions target MICA for lysosomal degradation

    Get PDF
    NKG2D plays a major role in controlling immune responses through the regulation of natural killer (NK) cells, αβ and γδ T-cell function. This activating receptor recognizes eight distinct ligands (the MHC Class I polypeptide-related sequences (MIC) A andB, and UL16-binding proteins (ULBP)1–6) induced by cellular stress to promote recognition cells perturbed by malignant transformation or microbial infection. Studies into human cytomegalovirus (HCMV) have aided both the identification and characterization of NKG2D ligands (NKG2DLs). HCMV immediate early (IE) gene up regulates NKGDLs, and we now describe the differential activation of ULBP2 and MICA/B by IE1 and IE2 respectively. Despite activation by IE functions, HCMV effectively suppressed cell surface expression of NKGDLs through both the early and late phases of infection. The immune evasion functions UL16, UL142, and microRNA(miR)-UL112 are known to target NKG2DLs. While infection with a UL16 deletion mutant caused the expected increase in MICB and ULBP2 cell surface expression, deletion of UL142 did not have a similar impact on its target, MICA. We therefore performed a systematic screen of the viral genome to search of addition functions that targeted MICA. US18 and US20 were identified as novel NK cell evasion functions capable of acting independently to promote MICA degradation by lysosomal degradation. The most dramatic effect on MICA expression was achieved when US18 and US20 acted in concert. US18 and US20 are the first members of the US12 gene family to have been assigned a function. The US12 family has 10 members encoded sequentially through US12–US21; a genetic arrangement, which is suggestive of an ‘accordion’ expansion of an ancestral gene in response to a selective pressure. This expansion must have be an ancient event as the whole family is conserved across simian cytomegaloviruses from old world monkeys. The evolutionary benefit bestowed by the combinatorial effect of US18 and US20 on MICA may have contributed to sustaining the US12 gene family
    corecore