21 research outputs found
E-Business Security Architectures
By default the Internet is an open high risk environment and also the main place where the e-business is growing. As result of this fact, the paper aims to highlight the security aspects that relate to distributed applications [3], with reference to the concept of e-business. In this direction will analyze the quality characteristics, considered to be important by the author. Based on these and on existing e-business architectures will be presented a particularly diagram which will reflect a new approach to the concept of future e-business. The development of the new architecture will have its stands based on technologies that are used to build the applications of tomorrow.e-business, distributed applications, security, architecture, technology
LIFECYCLE BASED AUDIT PROCESS FOR DISTRIBUTED APPLICATIONS
The paper wishes to present the audit process as part of a distributed framework in which a new set of metrics are built. The requirements for an audit process are described and on each of the lifecycle stages, the audit process is emphasized. The existing quality characteristics models from the literature are analyzed based on which a new set of metrics are built for sustaining the overall audit process.audit process, distributed applications, metrics and lifecycle
Security Optimization for Distributed Applications Oriented on Very Large Data Sets
The paper presents the main characteristics of applications which are working with very large data sets and the issues related to security. First section addresses the optimization process and how it is approached when dealing with security. The second section describes the concept of very large datasets management while in the third section the risks related are identified and classified. Finally, a security optimization schema is presented with a cost-efficiency analysis upon its feasibility. Conclusions are drawn and future approaches are identified.Security, Optimization, Very Large Data Sets, Distributed Applications
Security Optimization for Distributed Applications Oriented on Very Large Data Sets
The paper presents the main characteristics of applications which are working with very large data sets and the issues related to security. First section addresses the optimization process and how it is approached when dealing with security. The second section describes the concept of very large datasets management while in the third section the risks related are identified and classified. Finally, a security optimization schema is presented with a cost-efficiency analysis upon its feasibility. Conclusions are drawn and future approaches are identified
Collaborative Virtual Organizations in Knowledge-based Economy
The paper establishes the content of the virtual organizations concept, insisting on their collaborative nature. Types of virtual organizations architectures are developed and there are analyzed their characteristics compared to classical organizations existing in the pre-informational economy. There are presented virtual organizations for education, production and banking, focusing on their collaborative side. Metrics are built to evaluate the performance of collaborative virtual organizations
Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach
As in any domain that involves the use of software, the library information systems take advantages of cloud computing. The paper highlights the main aspect of cloud based systems, describing some public solutions provided by the most important players on the market. Topics related to content security in cloud based services are tackled in order to emphasize the requirements that must be met by these types of systems. A cloud based implementation of an Information Library System is presented and some adjacent tools that are used together with it to provide digital content and metadata links are described. In a cloud based Information Library System security is approached by means of ontologies. Aspects such as content security in terms of digital rights are presented and a methodology for security optimization is proposed
Informatics System Design for the Management of Nutritional Supplementation in Body Modelling Sports
Issues regarding body modeling are debated. Facts regarding the nutrional oriented processes for body modeling are identified. The nutriments classes are presented and how the administration process is conducted based on several characteristics and which are the stages of succeeding these processes. An informatics system is designed for the management of nutritional supplementation in order to control the calories intake based on the intentisty of physical effort. The stages of development are presented, identifying optimization criteria for the security of the systems and its users
Data Content Protection for Virtual Libraries Heritage
This paper presents aspects of digital content protection in virtual library systems. The legislation aspects are presented to better emphasize the need of new security mechanisms. Integrated library systems architecture is presented with focus on their main purpose, manipulating and rendering digital content to end-users. The cultural heritage stored in such systems is an important asset that needs to be protected against malicious manipulation. The characteristics of a smart virtual library, supported by an integrated library system, are analyzed and a security model is proposed for implementation, based on its particularities. The model aims to be an interface between the interactions of anonymous users with the Online Public Access Catalog of a virtual library that assures the protection of digital content. Conclusions are drawn to better support the idea of cultural persistence by the use of Information Systems