Filters








22 Hits in 4.5 sec

Jolie LEMMA: Model-Driven Engineering and Programming Languages Meet on Microservices [article]

Saverio Giallorenzo and Fabrizio Montesi and Marco Peressotti and Florian Rademacher and Sabine Sachweh
2021 arXiv   pre-print
In the field of microservices, Model-Driven Engineering has emerged as a powerful methodology for architectural design, and new programming languages have introduced language abstractions to deal with  ...  microservice development more effectively.  ...  Pattern-aware execution engines can enforce static constraints at runtime, e.g., keeping track of the (privacy-preserving) "signature" of each identified entity and its correlated immutable values.  ... 
arXiv:2104.02458v1 fatcat:a2eqch6qt5fi5h2mbwubinbk3u

MARVEL - D1.3: Architecture definition for MARVEL framework

Dragana Bajovic, Nikola Simic
2021 Zenodo  
in the relevant project areas.  ...  Finally, the document also includes mappings to the relevant Big Data, AI, and Fog computing reference architectures.  ...  data and systems in place, and preservation of the privacy of the citizens.  ... 
doi:10.5281/zenodo.5463896 fatcat:ekassky3trcwraipozxsiokwja

D3.1: Strategy analysis report and Cloud Computing

Dietrich Mark, Federico Facca
2021 Zenodo  
The paper explores key challenges and opportunities from the perspective of the demand in six key sectors: [...]  ...  Cloud computing, as a fundamental brick of a digital Europe, will play an even stronger role in the European economy and society by embracing core European values, spanning fundamental individual rights  ...  Then, of course, new privacy-preserving and data confidentiality/sovereignty processing architectures are needed, alongside lifecycle product models which are able to integrate the different stakeholders  ... 
doi:10.5281/zenodo.5530740 fatcat:j56fkvlparegliqexa5p27ckge

Explainable AI for B5G/6G: Technical Aspects, Use Cases, and Research Challenges [article]

Shen Wang, M.Atif Qureshi, Luis Miralles-Pechuaán, Thien Huynh-The, Thippa Reddy Gadekallu, Madhusanka Liyanage
2021 arXiv   pre-print
Moreover, we summarised the lessons learned from the recent attempts and outlined important research challenges in applying XAI for building 6G systems.  ...  This survey paper highlights the need for XAI towards the upcoming 6G age in every aspect, including 6G technologies (e.g., intelligent radio, zero-touch network management) and 6G use cases (e.g., industry  ...  Another critical issue is the privacy preservation of in intelligent radio.  ... 
arXiv:2112.04698v1 fatcat:y7ss4opmrjbsbjm3ip2vgkkgky

Cybersecurity issues in software architectures for innovative services

Andrea Melis
2020
However, new service-oriented architectures are emerging in this context, the so-called services enabler architecture.  ...  This work investigate the security threats of the emerging service enabler architectures, providing proof of concepts for these issues and the solutions too, based on several use-cases implemented in real  ...  Different works proposed metrics for the evaluation of the amount of privacy preserved in specific dataset.  ... 
doi:10.6092/unibo/amsdottorato/9303 fatcat:eixgln7jmfe5jpulbix6ix4eei

DARE Architecture and Technology internal report

Malcolm Atkinson, Rosa Filgueira, André Gemünd, Vangelis Karkaletsis, Iraklis Klampanos, Antonis Koukourikos, Amélie Levray, Michael Lindner, Federica Magnoni, Christian Pagé, Andreas Rietbrock, Alessandro Spinuso (+3 others)
2020 Zenodo  
This internal deliverable presents the progress since D2.1 and the new understanding of what is required from the DARE architecture, driven by the interplay of user requirements and technological opportunities  ...  microservices.  ...  preserve Make a back-up copy in a preservation service. restore Recover a backed-up copy. archive Make a preserved copy with appropriate metadata and quality controls.  ... 
doi:10.5281/zenodo.3697897 fatcat:negi7ssmfbdatcm65wkgymkicy

Advances in Digital Repositories

Adrian-Tudor Panescu
2020 figshare.com  
Research data anonymisation allows data to be shared whilst preserving the privacy of subjects or other involved parties.  ...  time, apart from the knowledge transfer from other domains, these results also conjecture a possibly distributed architecture for repositories, similar to the design of microservices.  ... 
doi:10.6084/m9.figshare.8247626.v1 fatcat:a5dxlyrl65ggzljjytvawtxlkq

Dare Architecture and Technology D2.2

Atkinson Malcolm, Klampanos Iraklis, Andries Valentina, Constantin Aurora, Filgueira Rosa, Genünd André, Gottschämmer Ellen, Karkaletsis Vangelis, Koukourikos Antonis, Levray Amélie, Linder Mike, Magnoni Federica (+6 others)
2020 Zenodo  
central goal is to support research developers – domain-expert software developers – to transparently make use of European e-infrastructures, research infrastructures and other platforms and software in  ...  We present progress since D2.1 with an interim report ID2.2 and the new understanding of what is required from the DARE architecture, driven by the interplay of user requirements and technological opportunities  ...  Some of the replies indicate limitations in the training, e.g., regarding difficulty in finding files and logs when the data catalogue ( §4.2.4) and provenance tools ( §4.3) provide these facilities.  ... 
doi:10.5281/zenodo.4733801 fatcat:nqgcpnkog5gmzgiefuqspiupqe

D2.1 Dare Architecture and Technical Positioning

Malcolm Atkinson, Emanuele Casarotti, Malin Ewering, Rosa Filgueira, André Gemünd, Iraklis Klampanos, Antonis Koukourikos, Amrey Krause, Federica Magnoni, Andrea Pagani, Christian Pagé, Andreas Rietbrock (+2 others)
2018 Zenodo  
The deliverable summarises the reequirements, outlines an architecture and framework, reports progress with prototyping the platform and identifies the form of future implementations.  ...  Constraints on the DARE architecture To achieve its target the architecture considers the following: 1.  ...  These functionalities include federation, stream processing, compatibility with Apache Spark, lossy and lossless streaming compression, privacy preserved data mining, etc.  ... 
doi:10.5281/zenodo.2613550 fatcat:s32p3orrerev5einzlmils34mu

OASIcs, Volume 86, Gabbrielli's Festschrift, Complete Volume [article]

Frank S. de Boer, Jacopo Mauro
2020
The Microservices Architectural Style and Java OSGi The microservices architectural style, see e.g. [25] , is born to address the problems of the traditional monolithic approach.  ...  The proposal architecture has been designed following a microservices architectural pattern. Microservices are a natural and widely adopted solution for implementing software platforms.  ...  It offers a RESTful JSON interface, a standard choice in microservices architecture (and it is usually adopted in Senseioty) in order to offer a solution as much compatible and reusable as possible.  ... 
doi:10.4230/oasics.gabbrielli fatcat:quirdjgconeajayodg7uri43x4

Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation [article]

Nitin Agrawal, Reuben Binns, Max Van Kleek, Kim Laine, Nigel Shadbolt
2021 pre-print
Homomorphic encryption, secure multi-party computation, and differential privacy are part of an emerging class of Privacy Enhancing Technologies which share a common promise: to preserve privacy whilst  ...  We conclude with implications for the development, deployment, and responsible governance of these privacy-preserving computation techniques.  ...  They turn privacy into something mathematically formalisable, e.g. in terms of entropy in cryptographic approaches, or indistinguishability in statistical approaches, which can all be understood as variations  ... 
doi:10.1145/3411764.3445677 arXiv:2101.08048v1 fatcat:kggifqe6drdxngsry46o6kmwgy

Specifying and Executing User Agents in an Environment of Reasoning and RESTful Systems Using the Guard-Stage-Milestone Approach

Tobias Käfer, Benjamin Jochum, Nico Aßfalg, Leonard Nürnberg
2021 Journal on Data Semantics  
Moreover, we give operational semantics to the ontology in a rule language that allows for executing user agents on Read-Write Linked Data.  ...  Our work shows that despite different assumptions of this environment in contrast to the traditional environment of workflow management systems, the Guard-Stage-Milestone approach can be transferred and  ...  For example, microservices [31] build on the web architecture and provide fine-grained read-write access to business functions.  ... 
doi:10.1007/s13740-021-00123-0 fatcat:xxtogqplcraypnsahqvao4k73i

A Metamodel for Business Rules with Access Control

Lex Wedemeijer
2016 Proceedings of the Sixth International Symposium on Business Modeling and Software Design   unpublished
In the To-Be architecture, the orders should be taken via e-mail and B2B channels. The functions of validation and updating of the taken orders should be preserved.  ...  However, little work has been done to identify and formalise the capabilities of this new technology.  ...  Ways to capture data, quality of data and the probability that the captured data is correct, reliability, versioning, privacy, and so on, are of importance as well.  ... 
doi:10.5220/0006222100460053 fatcat:4fyl522eibfx3g2qaeq7nvk2um

Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021

Joint Workshop Of The German Research Training Groups In Computer Science, Erlangen May 31–June 1, 2021, Felix Freiling
2021
Initiated in 1996 and run regularly since 2007, researchers of the German Research and Training Groups (RTGs) funded by the Deutsche Forschungsgemeinschaft (DFG) in the field of computer science meet annually  ...  The goal of these workshops is to foster an interchange of ideas and experiences in order to strengthen the connection within the German computer science community.  ...  Holger Giese Microservices (or microservices architecture) are cloud native architectural style that composes many loosely coupled and independently deployable smaller components, or services that are  ... 
doi:10.25593/opus4-fau-16426 fatcat:isoyq5lzdffxrdqzvkmfsnjgau

Multiple Dimensions of Community Network Scalability [chapter]

Roger Baig-Viñas, Leandro Navarro, Ramon Roca-i-Tio
2019 Zenodo  
the netCommons The Authors of the analyses featured in this volume are (in alphabetical order): Panayotis Antoniadis, Virginie Aubrée, Roger Baig Viñas, Luca Belli, Aris Dadoukis, Paolo Dini, Mélanie  ...  Acknowledgements This work was carried out in the context of the MAZI project (2016)(2017)(2018) which has received funding from the European Union's Horizon Acknowledgements This work was funded by  ...  Microservice Architecture Figure 4 4 Figure 4.1. MAZI software architecture Figure 4 4 Figure 4.2. MAZI Portal administration and user interface Figure 4 . 3 . 43 Figure 4.3.  ... 
doi:10.5281/zenodo.2560603 fatcat:iox3mfxejzbm3pslqrcirwf5la
« Previous Showing results 1 — 15 out of 22 results