102 resultados para service-oriented computing (SOC)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Small and medium enterprises (SMEs) are critical to strategic initiatives in an economy; however, their contribution to foreign trade is not as significant. SMEs are one of the principal driving forces in economic development. One of the greatest challenges is the internationalization process for longevity rather than seeing the process as initial market entry. The internationalization process research has typically involved four key constructs: market selection, decision to enter, entry modes and factors affecting entry modes. Past research has focused on large manufacturing firms. The export of architectural, engineering and construction (AEC) firms has undergone growth, yet there is still significant opportunity for further growth. The majority of AEC firms are SMEs. Notwithstanding assistance provided through international trade missions, organized export firm support networks and information packages by a burgeoning number of government agencies, there are still perceived barriers to market entry and long-term economic sustainability for SMEs. There are a number of problems faced by SMEs acting in foreign trade. This investigation explores the successful initial internationalization process constructs and identifies unique project-oriented sector characteristics. The study identified similarities and differences between two firms that have been exporting to various localities, including Eastern Europe, Africa, Middle East, UK, Asia and South America, for more than two decades. The similarities and differences were identified within eight major constructs: purpose, firm type, market image and design philosophy, entry mode strategy, institutional arrangement, factors affecting mode of entry, market selection and firm strategy in relation to project selection. The primary reasons for internationalization were associated with the firms' motivations related to growth and financial viability. This article discusses the various internationalization processes and strategies intrinsic to each case study and establishes a detailed set of empirical observations from which to develop further a grounded theoretical model of reflexive capability for the internationalization process. This study contributes to the body of knowledge around the SME AEC design service firm's internationalization process, as a dynamic, evolving and continuously adaptable construct for project-based sectors.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges are like on demand scalability and infinite resource provisioning as per the `pay-as-you-go' manner in favour of a single information owner (abbreviated as INO from now onwards) to multiple corporate INOs. While outsourcing information to a cloud storage controlled by a cloud service provider (abbreviated as CSP from now onwards) relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved. This paper perspicaciously delves into the facts of the Cloud Computing security issues and aims to explore and establish a secure channel for the INO to communicate with the CSP while maintaining trust and confidentiality. The objective of the paper is served by analyzing different protocols and proposing the one in commensurate with the requirement of the security property like information or data confidentiality along the line of security in Cloud Computing Environment (CCE). To the best of our knowledge, we are the first to derive a secure protocol by successively eliminating the dangling pitfalls that remain dormant and thereby hamper confidentiality and integrity of information that is worth exchanging between the INO and the CSP. Besides, conceptually, our derived protocol is compared with the SSL from the perspectives of work flow related activities along the line of secure trusted path for information confidentiality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The general idea of cloud computing is offering computational resources as scalable, on demand services accessible over the internet. However, this new realisation of on demand computing is hindered by the amount of user involvement. Currently, high level abstractions in cloud computing only exist in the form of services. In particular, there is no effective means to publish, discover and finally use required services in clouds. In response, we propose a user level abstraction on top of already available cloud abstraction layers, present its concept using the resources via web services (RVWS) framework and demonstrate its feasibility by simplifying the exposure and use of clusters, a commonly used resource in cloud computing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Establishing trust for resource sharing and collaboration has become an important issue in distributed computing environment. In this paper, we investigate the problem of establishing trust in hybrid cloud computing environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. We present a fully distributed framework that enable trust-based cloud customer and cloud service provider interactions. The framework aids a service consumer in assigning an appropriate weight to the feedback of different raters regarding a prospective service provider. Based on the framework, we developed a mechanism for controlling falsified feedback ratings from iteratively exerting trust level contamination due to falsified feedback ratings. The experimental analysis shows that the proposed framework successfully dilutes the effects of falsified feedback ratings, thereby facilitating accurate and fair assessment of the service reputations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While cloud computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A data owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a cloud service provider (CSP). This machine is at a location unknown to a data owner. This loss of control over data is further intensified with the lack of managing users' access to the data from practical cloud computing perspectives. In this paper, we introduce a new mechanism of ensuring trust and security in Software as a Service (SaaS) CC. Trust Ticket, with the supporting protocols, is our mechanism that helps a data owner in establishing a link between a CSP and a registered user. In our mechanism, a user first gets registered with a DO before receiving a Trust Ticket and a secret key from that DO. Each Trust Ticket is unique and encrypted. On completing the registration of each user, the DO apprises the CSP of the Trust Ticket. Trust Ticket and secret key are respectively for the registered user's getting accepted to the CSP and having a view of the data owner's data upon a successful verification by the CSP. We have done our experiment in Java network programming by creating an emulated cloud computing framework under the VMware ESXi 4.1 hyper visor based platform. Using the framework, we have evaluated our algorithmic protocol for Trust Ticket. We have also compared our work with prior work. Overall performance of our work is better. We argue that our proposed algorithmic protocol for Trust Ticket deployment establishes a data owner's trust. This trust is established through a data owner's control over data and a registered user, because a registered user is linked with a CSP by a data owner through Trust Ticket.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Clouicomputing is an emerging service technology that has ethical and entrepreneurial implications. Due to technological innovations increasing the attention placed on cloud computing services, more people are focusing on the security and privacy issues determined by ethical guidelines and how the technology is evolving as an entrepreneurial service innov.ation. This paper presents a theoretical perspective on how a person adopts cloud computing. The literature on technology innovation and adoption behaviour is examined with a focus on social cognitive theory. A theoretical framework is then presented, which indicates a number of propositions to describe the intention of a person to adopt cloud computing services. The role of technology marketing capability, sustained learning and outcome expectancy are included in helping to understand the role of cloud computing applications. Suggestions for future research and practical implications are stated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The cost and time of deploying HPC applications on clouds is a problem. Instead of conducting their research discipline specialists are forced to carry out activities for application deployment, publication and ease of access. In response, a new approach for HPC application deployment and access in clouds is proposed. The major innovations are a new approach to deploying and executing HPC applications on IaaS and PaaS clouds, and exposing HPC applications as services. Through three case studies this paper demonstrates the feasibility and effectiveness of the proposed approach that could lead to the building of a SaaS library of discipline-oriented services evocable through user friendly, discipline specific interfaces. The new approach will reduce the time and money needed to deploy and expose discipline HPC applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the advent of Cloud Computing, IDS as a service (IDSaaS) has been proposed as an alternative to protect a network (e.g., financial organization) from a wide range of network attacks by offloading the expensive operations such as the process of signature matching to the cloud. The IDSaaS can be roughly classified into two types: signature-based detection and anomaly-based detection. During the packet inspection, no party wants to disclose their own data especially sensitive information to others, even to the cloud provider, for privacy concerns. However, current solutions of IDSaaS have not much discussed this issue. In this work, focus on the signature-based IDSaaS, we begin by designing a promising privacy-preserving intrusion detection mechanism, the main feature of which is that the process of signature matching does not reveal any specific content of network packets by means of a fingerprint-based comparison. We further conduct a study to evaluate this mechanism under a cloud scenario and identify several open problems and issues for designing such a privacy-preserving mechanism for IDSaaS in a practical environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tracking services play a fundamental role in the smartphone ecosystem. While their primary purpose is to provide a smartphone user with the ability to regulate the extent of sharing private information with external parties, these services can also be misused by advertisers in order to boost revenues. In this paper, we investigate tracking services on the Android and iOS smartphone platforms. We present a simple and effective way to monitor traffic generated by tracking services to and from the smartphone and external servers. To evaluate our work, we dynamically execute a set of Android and iOS applications, collected from their respective official markets. Our empirical results indicate that even if the user disables or limits tracking services on the smartphone, applications can by-pass those settings and, consequently, leak private information to external parties. On the other hand, when testing the location 'on' setting, we notice that generally location is not tracked.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports on the second part of a two pronged qualitative investigation that examines the ways in which Australian primary teachers conceptualise geography and geography teaching. In the first part of the project, 47 pre-service primary teachers were surveyed. In this paper, I draw on interviews with six in-service primary teachers to explore their experiences, conceptions and perceptions of geography. The findings indicate a noticeable difference between the conceptions of geography held by experienced teachers and those of early career, in-service teachers. Similar to the pre-service teachers studied in part one of this study, the early career teachers had a narrow, information-oriented conception of geography and geography education. Conversely, the experienced teachers portrayed more complex, relational and process-oriented perspectives. The paper concludes by exploring some of the implications for the implementation of the new National geography curriculum in Australia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article reports on the results of a survey of Australian primary pre-service teachers’ experiences, conceptions and perceptions of geography. Research was conducted with two cohorts of undergraduate primary pre-service teachers; one group in second year and another in the final year of a four-year teacher education course. The findings show congruence with similar studies conducted in the UK and indicate that pre-service teachers had a very narrow conception of geography and geography education; a conception that was information-oriented and focused on broad knowledge about the world and locational knowledge and skills. The article concludes by exploring some of the implications for the implementation of the new national geography curriculum in Australia and for primary pre-service geography teacher education more broadly.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cloud computing is becoming popular as the next infrastructure of computing platform. However, with data and business applications outsourced to a third party, how to protect cloud data centers from numerous attacks has become a critical concern. In this paper, we propose a clusterized framework of cloud firewall, which characters performance and cost evaluation. To provide quantitative performance analysis of the cloud firewall, a novel M/Geo/1 analytical model is established. The model allows cloud defenders to extract key system measures such as request response time, and determine how many resources are needed to guarantee quality of service (QoS). Moreover, we give an insight into financial cost of the proposed cloud firewall. Finally, our analytical results are verified by simulation experiments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transparent computing is an emerging computing paradigm where the users can enjoy any kind of service over networks on-demand with any devices, without caring about the underlying deployment details. In transparent computing, all software resources (even the OS) are stored on remote servers, from which the clients can request the resources for local execution in a block-streaming way. This paradigm has many benefits including cross-platform experience, user orientation, and platform independence. However, due to its fundamental features, e.g., separation of computation and storage in clients and servers respectively, and block-streaming-based scheduling and execution, transparent computing faces many new security challenges that may become its biggest obstacle. In this paper, we propose a Transparent Computing Security Architecture (TCSA), which builds user-controlled security for transparent computing by allowing the users to configure the desired security environments on demand. We envision, TCSA, which allows the users to take the initiative to protect their own data, is a promising solution for data security in transparent computing. © 2014 IEEE.