427 Hits in 6.8 sec

Interoperable processing of digital elevation models in grid infrastructures

Sandra Lanig, Alexander Zipf
2009 Earth Science Informatics  
A standard for distributed spatial data processing was missing for a long time. This issue was addressed by the development of the OpenGIS Web Processing Service (WPS) specification.  ...  Here we show that Grid Computing in combination with OGC Web Services (OWS) is well suited to accomplish high processing performance and storage capacity for large-scale processing tasks of the geo community  ...  The objective of the project is the efficient integration and processing of spatial data based on GIS and SDI technologies in a working SDI-Grid infrastructure.  ... 
doi:10.1007/s12145-009-0030-y fatcat:paaeuodltjcxpchbfq3777nsu4

Enabling Scalable Data Processing and Management through Standards-based Job Execution and the Global Federated File System

Shahbaz Memon, Morris Riedel, Shiraz Memon, Chris Koeritz, Andrew Grimshaw, Helmut Neukirchen
2016 Scalable Computing : Practice and Experience  
Our work primarily focuses on providing data scientists with transparent access to these resources in order to easily analyze data.  ...  Those technologies should be accessible in a way that data scientists who are running data intensive computations do not have to deal with technical intricacies of the underling execution system.  ...  R1) Secure Trust Delegation: As in a distributed service interaction a user interacts with a portal or meta scheduler which then forwards the request to a service that takes care of the job execution and  ... 
doi:10.12694/scpe.v17i2.1160 fatcat:aeijhk4rmjgblbi4tsucizuh6m

Smart City IoT Platform Respecting GDPR Privacy and Security Aspects

Claudio Badii, Pierfrancesco Bellini, Angelo Difino, Paolo Nesi
2020 IEEE Access  
Many IoT frameworks and platforms claimed to have solved these issues, aggregating different sources of information, combining their data flows in new innovative services, providing security robustness  ...  The vastness and heterogeneity of devices and their composition offer innovative services and scenarios that require a new challenging vision in interoperability, security and data management.  ...  Snap4City and Km4City are 100% open source technologies and the platform of DISIT Lab can be accessed at  ... 
doi:10.1109/access.2020.2968741 fatcat:dohuxuc4a5eb5ctidgu5wvsaca

Overcoming Security Challenges in Microservice Architectures

Tetiana Yarygina, Anya Helene Bagge
2018 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)  
RESTUS partially addresses the security issues of the stateless resource constraint, but not the issues related to the cache and code-on-demand constraints.  ...  A natural progression of this work is to propose an architectural style that incorporates basic security principles.  ...  Delegated Authorization and Authentication Delegated authorization and shared authentication are an essential part of modern web security.  ... 
doi:10.1109/sose.2018.00011 dblp:conf/sose/YaryginaB18 fatcat:54wjuoxxhff2tlldyvowt2p2em

Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud

Pieter Van Gorp, Marco Comuzzi
2014 IEEE journal of biomedical and health informatics  
Fortunately, care institutions are likely to have secure messaging tools in place and therefore the access delegation message can be sent securely from the MyPHRMachines web server to the inbox of the  ...  Web services over SOAP, but can simply deploy their existing software in a VM image.  ...  In particular, he has focused on architectures for the automated negotiation of services quality and on the monitoring of service contracts and SLAs.  ... 
doi:10.1109/jbhi.2013.2257821 pmid:24403402 fatcat:wjq6ujfvcnbkxjk3sja2bnrbpi

Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services

Paul Marillonnet, Maryline Laurent, Mikaël Ates
2021 Journal of Computer Science and Technology  
Third, this paper achieves a functional comparison of solutions of very different technical natures. The outcome of this paper is the clear identification of functional gaps of each solution.  ...  As a result, this paper establishes the research directions to follow in order to fill these functional gaps.  ...  The delegation operates spatially.  ... 
doi:10.1007/s11390-021-9673-z fatcat:xhsehergrvaalkmmkfx25tv2fu

InSight2: A Modular Visual Analysis Platform For Network Situational Awareness in Large-Scale Networks

Hansaka Angel Dias Edirisinghe Kodituwakku, Alex Keller, Jens Gregor
2020 Electronics  
The complexity and throughput of computer networks are rapidly increasing as a result of the proliferation of interconnected devices, data-driven applications, and remote working.  ...  In this paper, we introduce InSight2, an open-source platform for manipulating both streaming and archived network flow data in real time that aims to address the issues of existing solutions such as scalability  ...  Front-End Functionality and Security Figure 3 illustrates web-based GUI and security features of InSight2.  ... 
doi:10.3390/electronics9101747 fatcat:6gkjs7luvvdujimsvskimxywfa

TLS Proxies: Friend or Foe? [article]

Mark O'Neill, Scott Ruoti, Kent Seamons, Daniel Zappala
2015 arXiv   pre-print
We find that 1 in 250 TLS connections are TLS-proxied.  ...  The use of TLS proxies to intercept encrypted traffic is controversial since the same mechanism can be used for both benevolent purposes, such as protecting against malware, and for malicious purposes,  ...  Of those tests, 11,764 returned a different X.509 certificate than was served by our secure web server, indicating the presence of a TLS proxy.  ... 
arXiv:1407.7146v3 fatcat:dq4rv7nf4nan7btnlmm2qs3ooa

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries

Y. Koglin, D. Yao, E. Bertino
2008 IEEE Transactions on Parallel and Distributed Systems  
Data security in such a framework is an important problem and crucial for many Web applications.  ...  Our approach permits multiple intermediaries to simultaneously perform content services on different portions of the data.  ...  Data Representation We cast our approach in the framework of XML [9] , [22] because of its widespread use in Web services.  ... 
doi:10.1109/tpds.2007.70758 fatcat:dqlvsnc7hnbqzjrvbcaeaxax5i

Enhancing the security of mobile health monitoring systems through trust negotiations

Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung
2011 2011 IEEE 36th Conference on Local Computer Networks  
record tracker to store medical records and a web enabled terminal which is used in accessing the web server services.  ...  One of the identified differences between TLS and SSL is that TLS is an open standard protocol (as mentioned in the list).  ...  SDK requires version 6 of the Java Development Kit (JDK), which can be downloaded from here.  ... 
doi:10.1109/lcn.2011.6115545 dblp:conf/lcn/ElkhodrSC11 fatcat:jdkamb7kdvd6rhqhuw2v6xlx2q

On the features and challenges of security and privacy in distributed internet of things

Rodrigo Roman, Jianying Zhou, Javier Lopez
2013 Computer Networks  
In order to understand the applicabil ity and viability of this distributed approach, it is necessary to know its advantages and dis advantages -not only in terms of features but also in terms of security  ...  In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information.  ...  Acknowledgements This work was partially supported by the Spanish Min istry of Science and Innovation through the ARES (CSD2007-00004) and SPRINT (TIN2009-09237) projects.  ... 
doi:10.1016/j.comnet.2012.12.018 fatcat:ncdbzrr5rve6hkmxgrkawvh4jq


Eric Shook, Davide Del Vento, Andrea Zonca, Jun Wang
2018 Proceedings of the Practice and Experience on Advanced Research Computing - PEARC '18  
The field of Geographic Information Science and Systems (GIS) uses myriad tools and datasets, which raises challenges in designing a science gateway to meet users' diverse research and teaching needs.  ...  We describe a new science gateway called the GISandbox that is designed meet the needs of researchers and educators leveraging geospatial computing, which is situated at the nexus of GIS and computational  ...  The authors would like to thank Mark Krenz and the Science Gateway Community Institute for his continued assistance in a cybersecurity audit as part of a Science Gateway Community Institute Incubator project  ... 
doi:10.1145/3219104.3219150 dblp:conf/xsede/ShookVZW18 fatcat:hl7pwvg5yzaszf6fcpvgjomz64

Addressless: A new internet server model to prevent network scanning

Shanshan Hao, Renjie Liu, Zhe Weng, Deliang Chang, Congxiao Bao, Xing Li, Hua Wang
2021 PLoS ONE  
In this paper, we propose a new model named addressless server, which separates the server into an entrance module and a main service module, and assigns an IPv6 prefix instead of an IPv6 address to the  ...  Eliminating unnecessary exposure is a principle of server security.  ...  [54] analyze the temporal and spatial characteristics of active IPv6 addresses. Li et al. [55] describe the distribution characteristics of Internet IPv6 prefixes.  ... 
doi:10.1371/journal.pone.0246293 pmid:33529188 fatcat:zzyeyel6jfemxhwn2kg6m4cwe4

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be [article]

Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin
2017 arXiv   pre-print
Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security.  ...  gaps between them, the trend of the IoT security risks and new problems that need further attention.  ...  Based on this, we select the optimal values for TW and CT. IV. IOT SECURITY PROBLEM AREAS Our in-depth study of web reports and academic papers resulted in a collection of IoT security issues.  ... 
arXiv:1703.09809v1 fatcat:chnaj5rnjvh5hnc42vsxwmqbq4

Binary Compatibility For SGX Enclaves [article]

Shweta Shinde and Jinhua Cui and Satyaki Sen and Pinghai Yuan and Prateek Saxena
2020 arXiv   pre-print
Through the lens of Ratel, we expose the fundamental trade-offs between performance and complete mediation on the OS-enclave interface, which are rooted in the aforementioned 5 SGX design restrictions.  ...  Further, while many prior works have offered partial forms of compatibility, we present the first attempt to offer binary compatibility with existing software on SGX.  ...  We thank Shipra Shinde for help on formatting the figures in this paper.  ... 
arXiv:2009.01144v1 fatcat:mhzgtph34rgglefid6bm3w3exm
« Previous Showing results 1 — 15 out of 427 results