Withthe advancement in distributedcomputing and collaborative software technologies, information sharing and privacy related issues are gaining interest of researchers related to digital information creation, manage...
详细信息
Withthe advancement in distributedcomputing and collaborative software technologies, information sharing and privacy related issues are gaining interest of researchers related to digital information creation, management, and distribution. Collaborative information sharing environment requires enhanced information sharing among users while privacy laws demand for the protection of user's information from unauthorized access and usage. Keeping this trade-off in view, there is a need for a flexible and enhanced information sharing model that preserves the privacy of user's information. We extend the Role-Based Access Control (RBAC) model to incorporate sharing and privacy related requirements and present a Dynamic Sharing and Privacy-aware Role-Based Access Control (DySP-RBAC) model. It is a family of models including core, hierarchical, and constrained RBAC models. the RBAC model is extended using team and task data elements as well as new data elements related to sharing and privacy of information. Sharing and privacy-based permission assignments and their conflict-handling strategies are described for a distributed and dynamic information sharing scenario.
the proceedings contain 29 papers. the special focus in this conference is on distributed, parallel and Biologically Inspired Systems. the topics include: Mastering conflicting trends in embedded systems design;a lang...
ISBN:
(纸本)9783642152337
the proceedings contain 29 papers. the special focus in this conference is on distributed, parallel and Biologically Inspired Systems. the topics include: Mastering conflicting trends in embedded systems design;a language for heterogeneous computations;scenario-based modeling in industrial information systems;an entirely model-based framework for hardware design and simulation;extending the standard execution model of UML for real-time systems;task migration for fault-tolerant flexray networks;flexible and dynamic replication control for interdependent distributed real-time embedded systems;generation of executable testbenches from natural language requirement specifications for embedded real-time systems;model checking of concurrent algorithms;integrate online model checking into distributed reconfigurable system on chip with adaptable OS services;efficient mutation-analysis coverage for constrained random verification;generating VHDL source code from UML models of embedded systems;a rapid, architectural simulation and synthesis framework for embedded processors;a mixed level simulation environment for stepwise RTOS software refinement;dependency-driven distribution of synchronous programs;distributed resource-aware scheduling for multi-core architectures with system C;robust partitioned scheduling for real-time multiprocessor systems;an infrastructure for flexible runtime reconfigurable multi-microcontroller systems;feature selection for classification using an ant system approach;a collaborative decision support model for marine safety and security operations and collaborating and learning predators on a pursuit scenario.
this paper proposes integration of secure agents with a secure communication infrastructure in order to provide rapid information gathering platform from various information sources and actors participating in a crisi...
详细信息
ISBN:
(纸本)9781612846385
this paper proposes integration of secure agents with a secure communication infrastructure in order to provide rapid information gathering platform from various information sources and actors participating in a crisis situation. the role of agents is primarily a coordinated collection of information. the secure communication infrastructure (SCI) provides communication services for voice and data exchange between users and systems. A special type of agent called User Communication Agent is described. the communication with users is enacted through dynamically generated XForms-based questionnaires integrated withthe user interface of the SCI. Although security and trust aspects are important part of both secure agents and SCI, we concentrate more on integration aspects between these two systems. the presented work is being developed in scope of the SECRICOM 7th FP integrated project.
Grids can be considered as dominant platforms for large-scale parallel/distributedcomputing in science and engineering. Clouds allow users to acquire and release resources on-demand. Next generation computing environ...
详细信息
ISBN:
(纸本)9783901882449
Grids can be considered as dominant platforms for large-scale parallel/distributedcomputing in science and engineering. Clouds allow users to acquire and release resources on-demand. Next generation computing environments will benefit from the combination of Grid and Cloud paradigms providing frameworks that integrate traditional Grid services with on-demand Cloud services. Nowadays, workflows are the preferred means for the combination of services into added value service chains representing functional business processes or complex scientific experiments. A promising way to manage effectively services composition in a dynamic and heterogenous environment is to make the workflow management framework able to self-adapt at runtime to changes in its environment and provide an uniform resource access mechanism over Grid and Cloud infrastructures. Autonomic workflow management systems can support the runtime modification of workflows withthe aim of improving their performance and recover from faults determining and provisioning the appropriate mix of Grid/Cloud services with requested QoS. this paper describes Sunflower an innovative P2P agent-based framework for configuring, enacting, managing and adapting workflows on hybrid Grid-Cloud infrastructures. To orchestrate Grid and Cloud services, Sunflower uses a bio-inspired autonomic choreography model and integrates the scheduling algorithm with a provisioning component that can dynamically launch virtual machines in a Cloud infrastructure to provide on-demand services in peak-load situations.
Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy ...
详细信息
Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. this paper presents active fingerprinting which combines robust watermarking and independent Gaussian fingerprints generated by Tardos algorithm to secure the distributed copy of the H.264 /AVC compressed video. this approach is derived from [1], It relies mainly on improving the visual quality by eliminating the perceivable distortion that exists in the fingerprinted copies as well as the copies after collusion attacks produced by using unbounded Gaussian fingerprints. In order to remove this perceptual distortion, in this paper, we propose a content adaptive watermaking method which takes full advantage of both Intra and Inter frames information of the video content. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.
gLite is one of the largest distributedcomputing infrastructures in operation. It provides access to hundreds of different clusters - all installed and maintained in different ways. this paper analyses the difficulti...
详细信息
ISBN:
(纸本)9780769539393
gLite is one of the largest distributedcomputing infrastructures in operation. It provides access to hundreds of different clusters - all installed and maintained in different ways. this paper analyses the difficulties which users typically experience when moving from their own workstation via clusters or supercomputers to the grid. Based on that analysis, this paper presents tools, which helps to overcome this gap and introduces an advanced commandline interface to the grid.
the mammalian immune system consists of vital tissue microenvironments that exhibit remarkable structural complexity and dynamic cellular behaviors. It is now possible to acquire time-lapse series of multi-channel thr...
详细信息
ISBN:
(纸本)9781424441266
the mammalian immune system consists of vital tissue microenvironments that exhibit remarkable structural complexity and dynamic cellular behaviors. It is now possible to acquire time-lapse series of multi-channel three dimensional images of multiple cell types and vasculature simultaneously, revealing dynamic events in their living tissue context. this talk will describe automated image analysis algorithms, parallel computation methods, and large-scale edit-based validation methods to detect and quantify key events such as homogeneous and heterogeneous cell-cell interactions, and methods to map events to their tissue context.
this work presents a high-order finite element solver developed in the MatLab environment with procedures for high performance computing based on a very simple domain decomposition technique. the code has been develop...
详细信息
ISBN:
(纸本)9781905088416
this work presents a high-order finite element solver developed in the MatLab environment with procedures for high performance computing based on a very simple domain decomposition technique. the code has been developed withthe goal of testing news procedures for the solution of finite elements problems using distributedcomputing. the code has been tested in many different problems including Poisson operator, Plane Stress, Plane Strain, Linear and Nonlinear Elasticity, Optimization, Contact and Reynolds Equation. this paper aims to present features of the developed software, mainly the aspects of domain decomposition and distributedcomputing.
Artificial Bee Colony (ABC) algorithm is an optimisation algorithm based on the intelligent behaviour of honey bee swarm. In this work, ABC algorithm is used to optimise the equilibrium of confined plasma in a nuclear...
详细信息
ISBN:
(纸本)9780769539393
Artificial Bee Colony (ABC) algorithm is an optimisation algorithm based on the intelligent behaviour of honey bee swarm. In this work, ABC algorithm is used to optimise the equilibrium of confined plasma in a nuclear fusion device. Plasma physics research for fusion still presents open problems that need a large computing capacity to be solved. this optimisation process is a long time consuming process so an environment like grid computing has to be used, thus the first step is to adapt and extend the ABC algorithm to use the grid capabilities. In this work we present a modification of the original ABC algorithm, its adaption to a grid computing environment and the application of this algorithm to the equilibrium optimisation process.
DAPSYS (international Conference on distributed and parallel Systems) is an international biannual conference series dedicated to all aspects of distributed and parallelcomputing. DAPSYS 2008, the 7thinternational C...
ISBN:
(纸本)9781441946393
DAPSYS (international Conference on distributed and parallel Systems) is an international biannual conference series dedicated to all aspects of distributed and parallelcomputing. DAPSYS 2008, the 7thinternational Conference on distributed and parallel Systems was held in September 2008in Hungary. distributed and parallel Systems: Desktop Grid computing, based on DAPSYS 2008, presents original research, novel concepts and methods, and outstanding results. Contributors investigate parallel and distributed techniques, algorithms, models and applications; present innovative software tools, environments and middleware; focus on various aspects of grid computing; and introduce novel methods for development, deployment, testing and evaluation. this volume features a special focus on desktop grid computing as well. Designed for a professional audience composed of practitioners and researchers in industry,this book is also suitable for advanced-level students in computer science.
暂无评论