24 resultados para internet computing

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Intelligent Internet Computing (IIC) is emerging rapidly as an exciting new paradigm including pervasive, grid, and peer-to-peer computing to provide computing and communication services any time and anywhere. IIC paradigm foresees seamless integration of communicating and computational devices and applications embedded in all parts of our environment, from our physical selves, to our homes, our offices, our streets and so on. Although IIC presents exciting enabling opportunities, the benefits will only be realized if application and security issues can be appropriately addressed. This special issue is intended to foster the dissemination of state-of-the-art research in the area of IIC, including novel applications associated with its utilization, security systems and services, security models. We plan to publish high quality manuscripts, which cover the various practical applications and related security theories of IIC. The papers should not be submitted simultaneously for publication elsewhere. Submissions of high quality papers describing mature results or on-going work are invited. Selected high-quality papers from “the Eleventh IEEE International Conference on High Performance Computing and Communications (HPCC-09) and the Third International Conference on Information Security and Assurance (ISA-09),” will be published in this special issue of Journal of Internet Technology on "Intelligent Internet Computing".

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This book is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper is written through the vision on integrating Internet-of-Things (IoT) with the power of Cloud Computing and the intelligence of Big Data analytics. But integration of all these three cutting edge technologies is complex to understand. In this research we first provide a security centric view of three layered approach for understanding the technology, gaps and security issues. Then with a series of lab experiments on different hardware, we have collected performance data from all these three layers, combined these data together and finally applied modern machine learning algorithms to distinguish 18 different activities and cyber-attacks. From our experiments we find classification algorithm RandomForest can identify 93.9% attacks and activities in this complex environment. From the existing literature, no one has ever attempted similar experiment for cyber-attack detection for IoT neither with performance data nor with a three layered approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper discusses innovation and entrepreneurial opportunities of Internet ventures. In the last decade the Internet has become an important communication tool as well as a platform for new business enterprises. Internet businesses are global, easy to set up with little or no capital requirements and innovative. These businesses range from intermediary services such as financial service providers supporting online payments and e-markets facilitating buying and selling in horizontal and vertical markets, to new enterprises selling unique products. However, the Internet age has seen a rise in startup dot.coms, a failure of dot.coms and an increasing trend in consolidation of the digital economy. Entrepreneurial opportunities on the Internet are highlighted in this paper with a review of literature on entrepreneurship opportunities, characteristics and and challenges. It includes case studies demonstrating the opportunities and challenges of Internet innovations and discusses characteristics of cyber entrepreneurs identified from the case studies. The relevance of technical knowledge such as computing and programming skills, perseverance and the ability to set up business with little or no capital are important traits of cyber entrepreneurs discussed in this paper. The other issues apparent from the case studies are an opportunistic and innovative mindset, and an ability to create value where there was none before. This paper highlights that Internet ventures are a type of e-business that are easy to implement, have no barriers to entry and for which technical knowledge is an asset.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Identifies and evaluates contemporary global approaches to taxation in internet commerce. Adapts the principles of evidence-based medicine to develop a working model for evidence-based taxation. A collaborative extranet structure is used to validate the axioms underpinning the critical success factors for a modern knowledge management solution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis presents a new framework allowing cloud services to be stateful, cloud resource state and characteristics to be published, and brokering for easy cloud resource discovery and selection to be offered. Using the framework, new technology developed significantly simplifies the discovery, selection and use of clusters on the Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many organizations are implementing Internet technology, specifically Word Wide Web technology, inside the organization in the form of an “organizational Internet” or irttrunet. Intranet technology can unify dispersed computer based information systems in the organization into one rich “system”. Thus, intranets can have a major impact on organizational processes, for example cross-functional information sharing and collaboration. We focus on the social aspects surrounding intranet implementation. We seek to answer how intranet implementations shape and how they are shaped by ‘social structures employed by organizational agents. We adapt structuration theory into an explanatory device to analyze inhanet implementation and we apply it to four cases. We conclude that, intranets are initially more shaped by, rather than shaping social structures, but that this may change over time. The following learning points are condensed: Firstly, intranets are socially constructed and implementers need to be cautious when seeking to transplanting Web technology into an organizational context. Secondly, intranets typically evolve in sophistication over time. Finally, institutionalization is isolated as the key challenge in intranet implementation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The general idea of cloud computing is offering computational resources as scalable, on demand services accessible over the internet. However, this new realisation of on demand computing is hindered by the amount of user involvement. Currently, high level abstractions in cloud computing only exist in the form of services. In particular, there is no effective means to publish, discover and finally use required services in clouds. In response, we propose a user level abstraction on top of already available cloud abstraction layers, present its concept using the resources via web services (RVWS) framework and demonstrate its feasibility by simplifying the exposure and use of clusters, a commonly used resource in cloud computing.