Filters








11,911 Hits in 5.3 sec

Web-conscious storage management for Web proxies

E.P. Markatos, D.N. Pnevmatikatos, M.D. Flouris, M.G.H. Katevenis
2002 IEEE/ACM Transactions on Networking  
We demonstrate the applicability of our approach by implementing Foxy, a web proxy which incorporates our web-conscious storage management techniques.  ...  In this paper we study the overheads associated with file I/O in web proxies, we investigate their underlying causes, and we propose web-conscious storage management: a set of techniques that exploit the  ...  The secondary storage size that both SQUID and Foxy use is 8 Gbytes.  ... 
doi:10.1109/tnet.2002.804836 fatcat:jqivearhfrh2lnuzvsycyqrlpe

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

John Patrick Barrowclough, Rameez Asif
2018 Security and Communication Networks  
For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack.  ...  Acknowledgments The authors would like to acknowledge the project (Grant no. 830965) research funding from Edinburgh Napier University, UK, for Project STRENGTH (Scalable, Tuneable, Resilient and Encrypted  ...  Secondary Storage. Each zone must have at least one secondary storage and all pods and hypervisors must have access to this storage.  ... 
doi:10.1155/2018/1681908 fatcat:xeegsjbgsnfvbhis2zgs4xmed4

Exploiting client caches: an approach to building large Web caches

Y. Zhu, Y. Hu
2003 2003 International Conference on Parallel Processing, 2003. Proceedings.  
Through Hier-GD, we explore the design issues of how to exploit client caches in cooperative proxy caching to build large Web caches.  ...  We show that exploiting client caches in cooperative proxy caching can significantly improve performance, particularly when the size of individual proxy caches is limited compared to the universe of Web  ...  For example, how is a P2P client cache constructed? How to manage the storage of a P2P client cache?  ... 
doi:10.1109/icpp.2003.1240606 dblp:conf/icpp/ZhuH03 fatcat:ucsqhitncffa5nzz4t5jlwwn3m

Enhanced Secured Communication Optimization In Data Packets Using Proxy Protocols

Shahul Hameed A, Dr. A. Shaji George, Bashiru Aremu, Digvijay Pandey
2021 International Journal of Intelligent Communication, Computing and Networks  
Essentially distributed storage engineering would provide a range of higher performing capacity staff that provides long-term internet storage management and even the distributed storage architecture.  ...  These conventions are too costly in view of the fact that they are combining complicated numerical operations for the whole database.  ...  Proxy re-encryption should not be confused with proxy signatures that are a separate form of structure for another purpose.  ... 
doi:10.51735/ijiccn/001/15 fatcat:jowl3dbbqjer7lxbobxe3kwpzu

Integrated Application Gateway through Cloud Computing

G. Deepa, G. Naveen Samuel
2016 International Journal of Engineering Research and  
Storage for the application can also be a hybrid schema by storing data in several clouds and also got to the user by this gateway scenario.  ...  Applications hosted on the cloud platform can be segmented for clients, by using the software as a service (SaaS) model.  ...  Proxy clouds stores the secondary path whereas the request of the user is to be routed via the gateway cloud [1] .  ... 
doi:10.17577/ijertv5is030809 fatcat:vgq5cyxgpbec3jad7g2yd5egra

DATS - Data Containers for Web Applications

Casen Hunger, Lluis Vilanova, Charalampos Papamanthou, Yoav Etsion, Mohit Tiwari
2018 Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '18  
We showcase eight different web applications including Gitlab and a Slack-like chat, significantly improve the worstcase overheads due to application replication, and demonstrate usable performance for  ...  to enable an untrusted storage service, such as memcached and deduplication, to operate on plain-text data across containers.  ...  Acknowledgements The authors would like to thank Petros Maniatis, Dawn Song, and Krste Asanovic for key insights and the anonymous reviewers for their valuable feedback on earlier drafts of the work.  ... 
doi:10.1145/3173162.3173213 dblp:conf/asplos/HungerVPET18 fatcat:lv5rr5757jhmtbykalcajoyovq

Special Aspects of the Development of the Security Infrastructure for Distributed Computing Systems

Julia Dubenskaya, Andrey Demichev, Alexander Kryukov, Nikolay Prikhodko
2015 Procedia Computer Science  
Our approach allows to avoid using the proxy certificates. This makes the security infrastructure of distributed computing systems simpler for development, support and use.  ...  One of the main problem in such systems is the necessity to use time-limited proxy certificates for delegation of rights from user to an execution remote service which acts on behalf of the user.  ...  A user signs a request to the WLCG by a self signed secondary certificated, namely by the proxy certificate.  ... 
doi:10.1016/j.procs.2015.11.059 fatcat:wpptb5dqhfeyxa3olotjx7x4ru

Supporting Offline Interaction with Web Sites Resilient to Interruptions Applied to E-learning Environments [chapter]

Félix Albertos Marco
2013 Lecture Notes in Computer Science  
storage (i.e.  ...  Web browser caching mechanism) and polices for client-side adaptation of Web sites.  ...  Most browsers do not have mechanisms for managing Web sites in offline mode.  ... 
doi:10.1007/978-3-319-04244-2_28 fatcat:owture2abvdm3nrclhgsmlyma4

A Proxy Load Reduction Technique to Improve Web performance

Ayaz Ahmad Sofi, Dr. Atul Garg
2015 International Journal of Engineering Research and  
This extended cache memory placed at proxy server side. This research also focused on the working of the existing Web cache proxy server.  ...  Web traffic has increased tremendously since the beginnings of the 1990s and overloading conditions of proxy servers occur repeatedly on Internet.  ...  The extended cache memory may be in the form of pen drive, compact disk, Digital Versatile Disk or any other secondary storage devices.  ... 
doi:10.17577/ijertv4is041112 fatcat:rnolxwd2u5buvcoentwa6t2m3y

Security on the US fusion grid

J.R. Burruss, T.W. Fredian, M.R. Thompson
2006 Fusion engineering and design  
of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.  ...  These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside  ...  GSI-enabled MDSplus allows for secure data transfer and storage on FusionGrid.  ... 
doi:10.1016/j.fusengdes.2006.04.052 fatcat:vxfthriknzhzvk2x2i7jbpnkc4

Kubernetes for HPC Administration

Samuel Knight
2021 Zenodo  
This paper describes hosting administrative HPC software on a Kubernetes platform, along with auxilary tooling for storage, IP/DNS management, metrics and logging.  ...  installing "Packaged" deployments • Helmfile [2] -Secondary project for combining multiple helm packages into one YAML file • SOPS [3] -Encypt YAML files with secrets using GPG • Systemd services, Authentication  ...  notebook Jupyterhub [2] -Web-based multi-user frontend that spawns Jupyterlab instances • HTTP page forwarded through reverse proxy • Authentication page uses LDAP backend • Communicates with Slurm controller  ... 
doi:10.5281/zenodo.5796387 fatcat:mnsq6ecyprh2flnosg6kj5v3gu

Pixel: a content management platform for quantitative omics data [article]

Thomas Denecker, William Durand, Julien Maupetit, Charles Hebert, Jean-Michel Camadro, Pierre Poulain, Gaelle Lelandais
2018 bioRxiv   pre-print
We present here the Pixel web application (Pixel Web App), an original content management platform to help people involved in a multi-omics biological project. Methods.  ...  Still, it helps to rapidly explore and mine existing results and holds a strategic position in the management of research data.  ...  The Pixel Web App does not store the 91 primary data. It is rather focused on annotation, storage and exploration of secondary data 92 (see Figure 1 ).  ... 
doi:10.1101/427724 fatcat:u6zkcbaj6jdadnsqfn22hczvlq

Pixel: a content management platform for quantitative omics data

Thomas Denecker, William Durand, Julien Maupetit, Charles Hébert, Jean-Michel Camadro, Pierre Poulain, Gaëlle Lelandais
2019 PeerJ  
We present here the Pixel web application (Pixel Web App), an original content management platform to help people involved in a multi-omics biological project.  ...  Still, it helps to rapidly explore and mine existing results and holds a strategic position in the management of research data.  ...  The Pixel Web App does not store the primary data. It is rather focused on annotation, storage and exploration of secondary data (see Fig. 1 ).  ... 
doi:10.7717/peerj.6623 pmid:30944779 pmcid:PMC6441322 fatcat:s2qp3y6k7zdhxgqry2s4qiu2xu

Proxy Searching of Non-Searchable and Poorly Searchable Open Access Archives of Digital Scholarly Journals [chapter]

Péter Jacsó
2003 Lecture Notes in Computer Science  
Many high quality, open access scholarly journals have been published on the Web. However, many of them do not offer a search program to find articles in their article archive.  ...  The paper demonstrates the efficiency and -in case of directly searchable archives-the much higher precision and relevance of searching the archives by proxy.  ...  Introduction Traditional publishers of scholarly print journals, such as Elsevier, Springer Verlag, and MCB University Press have expensive and capable information storage and retrieval, or database management  ... 
doi:10.1007/978-3-540-24594-0_57 fatcat:43aq6wn7dzf3dhbdr6se43egfa

Mapping ecosystem services for planning and management

Benis Egoh, Belinda Reyers, Mathieu Rouget, David M. Richardson, David C. Le Maitre, Albert S. van Jaarsveld
2008 Agriculture, Ecosystems & Environment  
Legal Notice Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication.  ...  Acknowledgments We would like to thank the following people for contributing to the report and providing information on the available data within the JRC institutes: Stephen Peedell, Nicole Ostländer,  ...  indicators used for mapping climate regulation Figure 11 11 Figure 11 Secondary indicators used for mapping recreation i) Fishing activities data JRC holds national level data on Fisheries Management  ... 
doi:10.1016/j.agee.2008.03.013 fatcat:tzae5j47bne7hegid3xnfomoia
« Previous Showing results 1 — 15 out of 11,911 results