276,307 Hits in 5.6 sec

Resource failures risk assessment modelling in distributed environments

Raid Alsoghayer, Karim Djemame
2014 Journal of Systems and Software  
We propose a mathematical model to predict the risk of failure of resources in such environments using a discrete-time analytical model driven by reliability functions fitted to observed data.  ...  Service providers offer access to resources and services in distributed environments such as Grids and Clouds through formal Service level Agreements (SLA), and need well-balanced infrastructures so that  ...  This research can be extended in many ways: 1) consideration of dynamic data, such as the current resource load or the availability of administrators to enhance the model; 2) risk assessment at the level  ... 
doi:10.1016/j.jss.2013.09.017 fatcat:nhxfosev2fb5tda4gbt5jlm5ai

Evaluation of Environmental Impact and Risk Assessment Methods of Industrial Buildings in Malaysia

Ezyana Anyzah Marmaya, Rohana Mahbub
2018 Asian Journal of Quality of Life  
The results of the research indicated that the project is perceived to have negative environmental impact measured under ecosystem, natural resources, and public impact.Keywords: risk assessment, risk  ...  This research aims to assess the risk factors and the impact of industrial projects to the environment and surrounding areas.  ...  failure case definition and hence the PHST risk model, whether capable of producing an offsite risk or not.  ... 
doi:10.21834/ajqol.v3i13.160 fatcat:t7texfcmzzefba3hscje7c5oeq

Risk Management of Information Systems Development in Distributed Environment

Aihua Yan, Vicki L. Sauter
2013 Americas Conference on Information Systems  
Therefore, risk management in distributed environment is becoming a critical area of concern.  ...  With more and more organizations outsource or offshore substantial resources in system development, organizations face up new challenges and risks not common to traditional development models.  ...  One standard quantitative risk assessment technique is to describe the magnitude of risk both in terms of a probability distribution, and the impact of risks on project success.  ... 
dblp:conf/amcis/YanS13 fatcat:co6ygsljnve43ciwti3qwpgfnu

Risk Assessment and the Environmental Impact of Industrial Projects in Malaysia: A case study of SAMUR, Sabah

Ezyana Anyzah Marmaya, Rohana Mahbub
2017 Environment-Behaviour Proceedings Journal (E-BPJ)  
The results of the research indicated that the project is perceived to have negative environmental impact measured under ecosystem, natural resources, and public impact.Keywords: risk assessment, risk  ...  This research aims to assess the risk factors and the impact of industrial projects to the environment and surrounding areas.  ...  failure case definition and hence the PHST risk model, whether capable of producing an offsite risk or not.  ... 
doi:10.21834/e-bpj.v2i5.618 fatcat:4hkatqddzrfc7bdunfevxol6ky

Assessment Methods Analysis of Models Reliability of Emergency Response in Emergency Situations

2017 DEStech Transactions on Environment Energy and Earth Science  
It is caused by existence of probability of failure in delivery and use of necessary resources for a variety of reasons.  ...  implementation of the emergency reaction models which are in state of multi-level degradation of resources at the time of emergency.  ...  However, work in the field of risk assessment models of the response of the Situational center in conditions of emergency in full, no.  ... 
doi:10.12783/dteees/icepe2017/11809 fatcat:c3adpaprsfde7gwzsd7dntxkem

Network model of security system

Piotr Adamczyk, Grzegorz Kiryk, Jarosław Napiórkowski, Andrzej Walczak, N. Mastorakis, V. Mladenov, A. Bulucea
2016 MATEC Web of Conferences  
The article presents the concept of building a network security model and its application in the process of risk analysis.  ...  It indicates the possibility of a new definition of the role of the network models in the safety analysis.  ...  1 Are the network models suitable for risk assessment? The information based on the standards.  ... 
doi:10.1051/matecconf/20167602002 fatcat:62q4wcrthnbynozottthmj2kgu

Risk driven Smart Home resource management using cloud services

Tom Kirkham, Django Armstrong, Karim Djemame, Ming Jiang
2014 Future generations computer systems  
We produce an architecture and evaluate risk models to assist in this management of devices from a security, privacy and resource management perspective.  ...  Specific to this is the management of resource usage in the home via the improved utilisation of devices, this is achieved by integration with the wider environment they operate in.  ...  Risk Models We calculate risk in terms of legal risk, appliance failure risk and resource security risk. The three were chosen to fit the use case.  ... 
doi:10.1016/j.future.2013.08.006 fatcat:3a65zicdnzajtiszia3qlknnum

A Risk Assessment Framework for Cloud Computing

Karim Djemame, Django Armstrong, Jordi Guitart, Mario Macias
2016 IEEE Transactions on Cloud Computing  
In terms of wider resource failure a wide range of studies exist for distributed computing environments [32] , [33] .  ...  However, the risk of failure is assessed considering the cloud resource historical information stored in the IP's Historical Database and the Cumulative Distribution Function (CDF) of the Time To Fail  ...  His main research areas focus on Grid/Cloud computing, including system architectures, resource management, and risk assessment. Dr. Djemame is a member of the IEEE. Django Armstrong  ... 
doi:10.1109/tcc.2014.2344653 fatcat:3x5wyuv3bvdglncwkfv26wkiru

Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities

Yonesy F. Nunez
2008 2008 IEEE International Conference on Networking, Sensing and Control  
The framework proposed in this paper is timely since most peer-to-peer distribution models focus more on content delivery and resource allocation.  ...  Malicious mobile code, specifically worms, are very efficient in their distribution, this is because they are able to infect other systems in a peer-to-peer distributed fashion.  ...  This distributed environment is primordial for the assessment of vulnerabilities and the distribution A6.4 of patches to minimize the risk exposure of vulnerable systems and, ultimately, increase an organization's  ... 
doi:10.1109/icnsc.2008.4525389 dblp:conf/icnsc/Nunez08 fatcat:i5esp2joj5hq5cswq6ht5hxcdq

Service Level Agreements in Cloud Computing and Big Data

K. Radha, B.Thirumala Rao, Shaik Masthan Babu, K.Thirupathi Rao, V.Krishna Reddy, P. Saikiran
2015 International Journal of Electrical and Computer Engineering (IJECE)  
This paper presents big data issues and research directions towards the ongoing work of processing of big data in the distributed environments.  ...  An optimal joint multiple resource allocation method is used in Allocation of resource model of distributed environment. The resources which Allocated are committed to every service request.  ...  CloudSim is a tool kit is used to model and simulation of distributed environment resources and scheduling the applications.  ... 
doi:10.11591/ijece.v5i1.pp158-165 fatcat:6thab2plbnbzdpwiegpddwzvgq

A six-dimensional model for supply chain sustainability risk analysis in telecommunication networks: a case study

Keyvan Rezghdeh, Sajjad Shokouhyar
2020 Modern Supply Chain Research and Applications  
It should be noted that the six-dimensional (6D) sustainability model used in this study will be a useful and comprehensive model for industries.  ...  In this study, evaluation was performed using the FMEA method as an analytical technique based on the principle of pre-occurrence prevention to identify potential failure factors in sensitive systems (  ...  Data collection Prior to the distribution of the questionnaire in this study, respondents were provided with a guide on how to complete the items associated with risk assessment process and how to evaluate  ... 
doi:10.1108/mscra-09-2019-0018 fatcat:o4knv2g2czee5cicgc7qko5syu

Access Control Based on Trust Policy in Open Grid Environment

Li Ting Gao, Zhen Yan Wang
2013 Advanced Materials Research  
This paper proposed a model for user security management.  ...  The experiments show that this model combines trust level with access control mechanism; it can enhance the user security management.  ...  This model can better meet the needs of the user management and enhance system security in the distributed dynamic environment.  ... 
doi:10.4028/ fatcat:35nvd53wpjexrjyps2zwimxzxy

A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing

Ahmad Amini, Norziana Jamil
2018 Journal of Physics, Conference Series  
Various quantitative and qualitative risk assessment models have been proposed but up to our knowledge, none of them is suitable for cloud computing environment.  ...  We then propose a new risk assessment model that sufficiently address all the characteristics of cloud computing, which was not appeared in the existing models.  ...  I would specially thank my family who has supported me through the ups and downs in completing this study. Without helps of the person mentioned above, I couldn't be succeed in this research.  ... 
doi:10.1088/1742-6596/1018/1/012004 fatcat:z4mjvwuzdnc6zglmjd4azaiw5q

Measuring the risk of software failure

S. A. Sherer
1989 Proceedings of the tenth international conference on Information Systems - ICIS '89  
Each module included in a software system poses a differential risk of failure in operation.  ...  We describe how the risk of software failure was estimated for modules in a commercial lending system.  ...  To estimate the risk associated with use of the Commercial Modu/e failure likelihood is estimated with a software Loan System, the environment was scrutinized to deterreliability model.  ... 
doi:10.1145/75034.75055 dblp:conf/icis/Sherer89 fatcat:do7jczxufrhj7n2tikmrvsh6ri

Simulation model for supply chain reliability evaluation

Ruslan Klimov, Yuri Merkuryev
2008 Technological and Economic Development of Economy  
This paper investigates problems related to supply chain risk identification and simulation-based risk evaluation. Accordingly, the paper is divided into two logical parts.  ...  The first part represents earlier researches about risk recognition within the sphere of supply chains. The distinction between terms "uncertainty" and "risk" is discussed.  ...  cannot function normally Failure rates Conditional criteria for assessing risk of particular resource functioning failure Repair rates Conditional criteria for assessing probability that particular  ... 
doi:10.3846/1392-8619.2008.14.300-311 fatcat:guz5leezrraw5kmt2caiaykioi
« Previous Showing results 1 — 15 out of 276,307 results