21 research outputs found

    E-Business Security Architectures

    Get PDF
    By default the Internet is an open high risk environment and also the main place where the e-business is growing. As result of this fact, the paper aims to highlight the security aspects that relate to distributed applications [3], with reference to the concept of e-business. In this direction will analyze the quality characteristics, considered to be important by the author. Based on these and on existing e-business architectures will be presented a particularly diagram which will reflect a new approach to the concept of future e-business. The development of the new architecture will have its stands based on technologies that are used to build the applications of tomorrow.e-business, distributed applications, security, architecture, technology

    LIFECYCLE BASED AUDIT PROCESS FOR DISTRIBUTED APPLICATIONS

    Get PDF
    The paper wishes to present the audit process as part of a distributed framework in which a new set of metrics are built. The requirements for an audit process are described and on each of the lifecycle stages, the audit process is emphasized. The existing quality characteristics models from the literature are analyzed based on which a new set of metrics are built for sustaining the overall audit process.audit process, distributed applications, metrics and lifecycle

    Security Optimization for Distributed Applications Oriented on Very Large Data Sets

    Get PDF
    The paper presents the main characteristics of applications which are working with very large data sets and the issues related to security. First section addresses the optimization process and how it is approached when dealing with security. The second section describes the concept of very large datasets management while in the third section the risks related are identified and classified. Finally, a security optimization schema is presented with a cost-efficiency analysis upon its feasibility. Conclusions are drawn and future approaches are identified.Security, Optimization, Very Large Data Sets, Distributed Applications

    Security Optimization for Distributed Applications Oriented on Very Large Data Sets

    Get PDF
    The paper presents the main characteristics of applications which are working with very large data sets and the issues related to security. First section addresses the optimization process and how it is approached when dealing with security. The second section describes the concept of very large datasets management while in the third section the risks related are identified and classified. Finally, a security optimization schema is presented with a cost-efficiency analysis upon its feasibility. Conclusions are drawn and future approaches are identified

    Collaborative Virtual Organizations in Knowledge-based Economy

    Get PDF
    The paper establishes the content of the virtual organizations concept, insisting on their collaborative nature. Types of virtual organizations architectures are developed and there are analyzed their characteristics compared to classical organizations existing in the pre-informational economy. There are presented virtual organizations for education, production and banking, focusing on their collaborative side. Metrics are built to evaluate the performance of collaborative virtual organizations

    Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach

    No full text
    As in any domain that involves the use of software, the library information systems take advantages of cloud computing. The paper highlights the main aspect of cloud based systems, describing some public solutions provided by the most important players on the market. Topics related to content security in cloud based services are tackled in order to emphasize the requirements that must be met by these types of systems. A cloud based implementation of an Information Library System is presented and some adjacent tools that are used together with it to provide digital content and metadata links are described. In a cloud based Information Library System security is approached by means of ontologies. Aspects such as content security in terms of digital rights are presented and a methodology for security optimization is proposed

    Informatics System Design for the Management of Nutritional Supplementation in Body Modelling Sports

    No full text
    Issues regarding body modeling are debated. Facts regarding the nutrional oriented processes for body modeling are identified. The nutriments classes are presented and how the administration process is conducted based on several characteristics and which are the stages of succeeding these processes. An informatics system is designed for the management of nutritional supplementation in order to control the calories intake based on the intentisty of physical effort. The stages of development are presented, identifying optimization criteria for the security of the systems and its users

    Data Content Protection for Virtual Libraries Heritage

    No full text
    This paper presents aspects of digital content protection in virtual library systems. The legislation aspects are presented to better emphasize the need of new security mechanisms. Integrated library systems architecture is presented with focus on their main purpose, manipulating and rendering digital content to end-users. The cultural heritage stored in such systems is an important asset that needs to be protected against malicious manipulation. The characteristics of a smart virtual library, supported by an integrated library system, are analyzed and a security model is proposed for implementation, based on its particularities. The model aims to be an interface between the interactions of anonymous users with the Online Public Access Catalog of a virtual library that assures the protection of digital content. Conclusions are drawn to better support the idea of cultural persistence by the use of Information Systems
    corecore