Cloud computing is a hotly debated and researched topic amongst all group of users ranging from industry to academia. It has highly raised the expectations of small, medium and large enterprises beyond measure. Many o...
详细信息
ISBN:
(纸本)9781479966295
Cloud computing is a hotly debated and researched topic amongst all group of users ranging from industry to academia. It has highly raised the expectations of small, medium and large enterprises beyond measure. Many organizations have migrated to cloud. The progressive use of cloud resources in the entire IT sector urged the need for better management of cloud infrastructure. Cloud infrastructure needs most efficient management techniques to cater to increasingly growing demands of users. Cloud computing has evolved tremendously and is still constantly undergoing changes. This paper gives the overview of cloud orchestration software along with their features.
The distributed systems are highly fault prone environment to work with. Thus, fault tolerance is a major concern in distributed computing. The available failure resiliency techniques mitigate only the failures that a...
详细信息
ISBN:
(纸本)9781479966295
The distributed systems are highly fault prone environment to work with. Thus, fault tolerance is a major concern in distributed computing. The available failure resiliency techniques mitigate only the failures that are limited in some way. However, it is extremely difficult to limit the failures because the autonomous nodes may suffer autonomous failures. Nevertheless, in mission critical applications, the uncontrolled failures are unaffordable. Hence, it is highly desirable that the system survives such failures. The survivability of computer networks is a popular research topic. However, the survivability of computing systems has not been in focus. In this illustration, we have attempted to raise this issue and bring out certain requirements and features related to survivable computing systems. To the best of my knowledge, it is the first attempt in the direction.
An increasing number of elderly people leads to demand for social robots to support health care and independent life. An overview of various potential applications of social robots is provided in this paper. In additi...
详细信息
ISBN:
(纸本)9781479966295
An increasing number of elderly people leads to demand for social robots to support health care and independent life. An overview of various potential applications of social robots is provided in this paper. In addition, the latest research progress in our institute is presented, i.e., multi-party interaction, gesture recognition, affective computing, and attention capture. All the research and applications demonstrate that social robots are good assistive robots for people with special needs.
The paper develops ontology for cyber security to provide information from huge collection of structured and unstructured web data. It deals with identification of several aspects related to cyber security including v...
详细信息
In recent times there has been significant advances in managing different types of sensors and industrial devices by IoT (Internet of Things) protocol. Along with the availability of massive amount of processing power...
详细信息
ISBN:
(纸本)9781509052561
In recent times there has been significant advances in managing different types of sensors and industrial devices by IoT (Internet of Things) protocol. Along with the availability of massive amount of processing power provided by the Cloud new opportunities have emerged for complete automation of industrial devices. IoT has a vast application in different sectors and domains which are yet to be explored. In industry domain, industrial automation is need of the hour to increase the time to market with high grade quality and enhanced productivity. In this paper we explain proven ways to utilize the capabilities of Cloud and IoT to control the device and analyze the data generated by them.
ICT (Information and communication technology) has been designated as, one of the best education systems. It enhance the quality of education, looking into the current scenario of Indian education system, it need a re...
详细信息
Authentication, authorization, and access control are fundamental functionalities that are crucial for network infrastructures and software applications. These functionalities work together to create a fundamental sec...
详细信息
ISBN:
(纸本)9798331529109;9798331529093
Authentication, authorization, and access control are fundamental functionalities that are crucial for network infrastructures and software applications. These functionalities work together to create a fundamental security layer that allows administrative entities to control user actions. Implementing a security layer may be simple for basic applications, but as modern digital infrastructures become more complex, more advanced security systems are needed. Traditional perimeter-based security models, long relied upon for securing large networks, exhibit vulnerabilities and lack adaptability to modern architectures. As technology advances, there is a growing demand for new authentication and authorization systems to keep up with the changes. Zero Trust (ZT) emerges as a paradigm embodying such principles and concepts for constructing contemporary security systems. This paper introduces a ZT-based Single Sign-On (SSO) framework to demonstrate how ZT can be realized in multi-service environments using Attribute-Based Access Control (ABAC). A prototype is developed to show the feasibility and applicability of the proposed framework in a smart city context.
Near Field Communication (NFC) is an emerging wireless short-range communication technology innovation that is based on existing standards of the Radio Frequency Identification (RFID) infrastructure. In this paper we ...
详细信息
ISBN:
(纸本)9781479966295
Near Field Communication (NFC) is an emerging wireless short-range communication technology innovation that is based on existing standards of the Radio Frequency Identification (RFID) infrastructure. In this paper we give an overview of NFC technology and discuss its adaptation worldwide. We then focus on the current trends and application of NFC technology in India. Both existing NFC applications and some conceivable future situations are analyzed in this connection. Furthermore, security concerns, difficulties and present conflicts are also discussed.
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the o...
详细信息
ISBN:
(纸本)9781479966295
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the internet. Since Cloud computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.
Cloud computing changed the way of computing as utility services offered through public network. The adoption of cloud computing services has gained the momentum over these years, due to the agility and cost associate...
详细信息
ISBN:
(纸本)9781479966295
Cloud computing changed the way of computing as utility services offered through public network. The adoption of cloud computing services has gained the momentum over these years, due to the agility and cost associated for accessing computational services over traditional one. The cloud providers offer similar services with nonlinear pricing to differentiate the services and to cater the various consumer market segments. This paper investigates different tariff of cloud service: usage based, flat rate, two part tariff, three part tariff with allowance and freemium. In particular, the cloud service tariff evaluation and choice models have been reviewed and the selection of optimal cloud pricing plan methodology for consumers is proposed.
暂无评论