首页 > 最新文献

IEEE International Symposium on Network Computing and Applications最新文献

英文 中文
Message from the program chairs 来自节目主持人的信息
Pub Date : 2022-11-01 DOI: 10.1109/NCA.2016.7778578
A. Gkoulalas-Divanis, Alessandro Pellegrini, P. D. Sanzo
164 papers were submitted to DSD 2014, from 50 countries. Slightly less than 50% were selected for oral presentation: 41 in the main track, and 40 in the conference Special Sessions. In addition, 22 papers were selected for poster presentation and 4 were invited to the Special Session dedicated to ongoing activity in European R&D projects in the DSD area. All selected papers were subject to a rigorous review process that averaged three reviews per paper, and were ranked and thresholded according to their scores, weighted by the reviewers confidence.
2014年向DSD提交了来自50个国家的164篇论文。略少于50%的会议被选作口头报告:41个在主会场,40个在会议特别会议。此外,22篇论文被选为海报展示,4篇论文被邀请参加特别会议,专门讨论在DSD领域的欧洲研发项目正在进行的活动。所有入选的论文都要经过严格的评审过程,平均每篇论文有三篇评审,并根据他们的分数进行排名和阈值划分,并由审稿人的信心加权。
{"title":"Message from the program chairs","authors":"A. Gkoulalas-Divanis, Alessandro Pellegrini, P. D. Sanzo","doi":"10.1109/NCA.2016.7778578","DOIUrl":"https://doi.org/10.1109/NCA.2016.7778578","url":null,"abstract":"164 papers were submitted to DSD 2014, from 50 countries. Slightly less than 50% were selected for oral presentation: 41 in the main track, and 40 in the conference Special Sessions. In addition, 22 papers were selected for poster presentation and 4 were invited to the Special Session dedicated to ongoing activity in European R&D projects in the DSD area. All selected papers were subject to a rigorous review process that averaged three reviews per paper, and were ranked and thresholded according to their scores, weighted by the reviewers confidence.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117330143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote: Evolving Systems for Situational Awareness 主题演讲:发展态势感知系统
Pub Date : 2016-10-01 DOI: 10.1109/NCA.2016.7778582
W. Strayer
The most basic functions of any organism or organized unit requires understanding the environment. This is accomplished through sensing; for organisms, sensing is an evolved faculty. The same is true for military and first responder units such as squads, who are relying on more sophisticated sensing systems to gain greater situational awareness (SA) in order to more effectively and safely conduct their missions. Adding sensing to the squad, however, only solves part of the problem; there must be an appropriate communications system in place to make full use of the acquired SA information. This talk will explore the use of content-based networking solutions for efficiently distributing the SA information in a decentralized manner.
任何生物体或组织单位的最基本功能都需要了解环境。这是通过感应完成的;对生物体来说,感知是一种进化出来的能力。同样的道理也适用于军事和第一反应单位,如小队,他们依靠更复杂的传感系统来获得更大的态势感知(SA),以便更有效、更安全地执行任务。然而,给球队增加传感只能解决部分问题;必须有适当的通信系统,以充分利用所获得的SA信息。本演讲将探讨基于内容的网络解决方案的使用,以分散的方式有效地分发SA信息。
{"title":"Keynote: Evolving Systems for Situational Awareness","authors":"W. Strayer","doi":"10.1109/NCA.2016.7778582","DOIUrl":"https://doi.org/10.1109/NCA.2016.7778582","url":null,"abstract":"The most basic functions of any organism or organized unit requires understanding the environment. This is accomplished through sensing; for organisms, sensing is an evolved faculty. The same is true for military and first responder units such as squads, who are relying on more sophisticated sensing systems to gain greater situational awareness (SA) in order to more effectively and safely conduct their missions. Adding sensing to the squad, however, only solves part of the problem; there must be an appropriate communications system in place to make full use of the acquired SA information. This talk will explore the use of content-based networking solutions for efficiently distributing the SA information in a decentralized manner.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the steering committee and general chairs 指导委员会和总主席的致辞
Pub Date : 2016-10-01 DOI: 10.1109/NCA.2016.7778577
D. Avresky, M. Vouk
All research topics of IEEE NCA*, for more than one decade, have been contributing to the creation of the foundation of the Network/Cloud Computing research and application do domain. Now, Network/Cloud Computing is becoming the major mode of operation of the Information Technology Industry over the Internet. BIG Data, Software Defined Networks (SDN), Network Functions Virtualization (NFI), Internet of Things (IoT) have profound effect on the innovations and modern society. The challenge for Network Cloud Computing is to realize a true Internet of Things, a network capable of supporting potentially trillions of wireless connected devices and with overall bandwidth one thousand times higher that today's wireless networks. Current IT technologies are approaching their limits.
十多年来,IEEE NCA*的所有研究课题都为网络/云计算研究和应用领域的基础建设做出了贡献。目前,网络/云计算正在成为互联网上信息技术产业的主要运行方式。大数据、软件定义网络(SDN)、网络功能虚拟化(NFI)、物联网(IoT)对创新和现代社会产生了深远的影响。网络云计算面临的挑战是实现一个真正的物联网,一个能够支持潜在的数万亿无线连接设备的网络,其总带宽比当今的无线网络高1000倍。当前的信息技术正在接近极限。
{"title":"Message from the steering committee and general chairs","authors":"D. Avresky, M. Vouk","doi":"10.1109/NCA.2016.7778577","DOIUrl":"https://doi.org/10.1109/NCA.2016.7778577","url":null,"abstract":"All research topics of IEEE NCA*, for more than one decade, have been contributing to the creation of the foundation of the Network/Cloud Computing research and application do domain. Now, Network/Cloud Computing is becoming the major mode of operation of the Information Technology Industry over the Internet. BIG Data, Software Defined Networks (SDN), Network Functions Virtualization (NFI), Internet of Things (IoT) have profound effect on the innovations and modern society. The challenge for Network Cloud Computing is to realize a true Internet of Things, a network capable of supporting potentially trillions of wireless connected devices and with overall bandwidth one thousand times higher that today's wireless networks. Current IT technologies are approaching their limits.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129669406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Complexity Fault-Tolerant Document Storage System 一个低复杂度的容错文档存储系统
Pub Date : 2014-08-21 DOI: 10.1109/NCA.2014.17
Dishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, José Juan García-Hernández
Fault-tolerant systems are those that continue to work properly even when faults occur. Distributed systems for files storing are susceptibles to faults, these failures can lead to loss of files completely, for this reason, these systems require strategies for recovery from failures. In this paper, a low-complexity distributed system for storing files in the cloud with fault tolerance is proposed. Files are stored in blocks, dispersed in a set of 7 servers and the reconstruction process is carried out using any combination of 6 as the proposed model generates redundancy blocks using parity mechanisms. From the experimental results, the reliability, security, speed for dispersion, and reconstruction of the proposed system are shown.
容错系统是指即使发生故障也能继续正常工作的系统。用于文件存储的分布式系统容易受到故障的影响,这些故障可能导致文件完全丢失,因此,这些系统需要从故障中恢复的策略。本文提出了一种具有容错功能的低复杂度分布式云文件存储系统。文件存储在块中,分散在一组7台服务器中,并且使用6台服务器的任意组合进行重建过程,因为所提出的模型使用奇偶校验机制生成冗余块。实验结果表明,该系统具有较高的可靠性、安全性、离散速度和重构能力。
{"title":"A Low-Complexity Fault-Tolerant Document Storage System","authors":"Dishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, José Juan García-Hernández","doi":"10.1109/NCA.2014.17","DOIUrl":"https://doi.org/10.1109/NCA.2014.17","url":null,"abstract":"Fault-tolerant systems are those that continue to work properly even when faults occur. Distributed systems for files storing are susceptibles to faults, these failures can lead to loss of files completely, for this reason, these systems require strategies for recovery from failures. In this paper, a low-complexity distributed system for storing files in the cloud with fault tolerance is proposed. Files are stored in blocks, dispersed in a set of 7 servers and the reconstruction process is carried out using any combination of 6 as the proposed model generates redundancy blocks using parity mechanisms. From the experimental results, the reliability, security, speed for dispersion, and reconstruction of the proposed system are shown.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"127 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPv4+6
Pub Date : 2011-08-25 DOI: 10.1109/NCA.2011.53
Yongmao Ren, Hualin Qian, E. Yuepeng, Jun Li, Jingguo Ge
The routing scalability and IP address exhaustion are two significant issues the current Internet faces. The "locator/identifier (Loc/ID) split" has become a well recognized design principle for future Internet architectures that make Internet routing more scalable. In this paper, a novel Loc/ID split routing and addressing architecture called IPv4+6 is proposed. It not only solves the routing scalability problem but also expands the IP address space. It is easy to deploy, which only needs to make simple changes on DNS and gateway router.
路由可扩展性和IP地址耗尽是当前Internet面临的两个重要问题。“定位器/标识符(Loc/ID)分割”已经成为未来互联网架构中公认的设计原则,使互联网路由更具可扩展性。本文提出了一种新的Loc/ID分割路由寻址体系结构IPv4+6。它不仅解决了路由的可扩展性问题,而且扩展了IP地址空间。部署简单,只需要在DNS和网关路由器上做一些简单的修改。
{"title":"IPv4+6","authors":"Yongmao Ren, Hualin Qian, E. Yuepeng, Jun Li, Jingguo Ge","doi":"10.1109/NCA.2011.53","DOIUrl":"https://doi.org/10.1109/NCA.2011.53","url":null,"abstract":"The routing scalability and IP address exhaustion are two significant issues the current Internet faces. The \"locator/identifier (Loc/ID) split\" has become a well recognized design principle for future Internet architectures that make Internet routing more scalable. In this paper, a novel Loc/ID split routing and addressing architecture called IPv4+6 is proposed. It not only solves the routing scalability problem but also expands the IP address space. It is easy to deploy, which only needs to make simple changes on DNS and gateway router.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The +CAL Algorithm Language +CAL算法语言
Pub Date : 2006-07-24 DOI: 10.1109/NCA.2006.52
L. Lamport
Algorithms are different from programs and should not be described with programming languages. For example, algorithms are usually best described in terms of mathematical objects like sets and graphs instead of the primitive objects like bytes and integers provided by programming languages. Until now, the only simple alternative to programming languages has been pseudo-code. +CAL is an algorithm language based on TLA+. A +CAL algorithm is automatically translated to a TLA+ specification that can be checked with the TLC model checker or reasoned about formally. +CAL makes pseudo-code obsolete.
算法不同于程序,不应该用编程语言来描述。例如,算法通常最好用集合和图等数学对象来描述,而不是用编程语言提供的字节和整数等原始对象来描述。到目前为止,编程语言的唯一简单替代品就是伪代码。+CAL是一种基于TLA+的算法语言。一个+CAL算法被自动转换成一个TLA+规范,该规范可以用TLC模型检查器进行检查或进行正式推理。+CAL使伪代码过时。
{"title":"The +CAL Algorithm Language","authors":"L. Lamport","doi":"10.1109/NCA.2006.52","DOIUrl":"https://doi.org/10.1109/NCA.2006.52","url":null,"abstract":"Algorithms are different from programs and should not be described with programming languages. For example, algorithms are usually best described in terms of mathematical objects like sets and graphs instead of the primitive objects like bytes and integers provided by programming languages. Until now, the only simple alternative to programming languages has been pseudo-code. \u0000 \u0000+CAL is an algorithm language based on TLA+. A +CAL algorithm is automatically translated to a TLA+ specification that can be checked with the TLC model checker or reasoned about formally. +CAL makes pseudo-code obsolete.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132523911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Application-Aware Reliability and Security: The Trusted ILLIAC Approach 应用感知的可靠性和安全性:可信的ILLIAC方法
Pub Date : 2006-07-24 DOI: 10.1109/NCA.2006.15
R. Iyer
Security and reliability are the key attributes in building highly trusted systems. System security violations (e.g., unauthorized privileged access or the compromising of data integrity) and reliability failures can be caused by hardware problems (transient or intermittent), software bugs, resource exhaustion, environmental conditions, or any complex interaction among these factors. To build a truly trustworthy system, the designer must find ways to mitigate (avoid and tolerate) against accidental errors and malicious attacks. Trusted ILLIAC ^1 is a reliable and secure clustercomputing platform being built at the University of Illinois Coordinated Science Laboratory (CSL) and Information Trust Institute (ITI), involving faculty from Electrical and Computer Engineering and Computer Science Departments. Trusted ILLIAC is intended to be a large, demonstrably trustworthy cluster-computing system to support what is variously referred to as on-demand/utility computing or adaptive enterprise computing. Such systems require that a significant number of applications co-exist and share hardware/software resources using a variety of containment boundaries. Current solutions aim at providing hardware and software solutions that can only be described as a one-size-fits-all approaches. Today’s environments are complex, expensive to implement, and nearly impossible to validate. The challenge is to provide an application-specific level of reliability and security in a totally transparent manner, while delivering optimal performance. A promising approach lies in developing a new set of application-aware methods that provide customized levels of trust (specified by the application) enforced using an integrated approach involving reprogrammable hardware, enhanced compiler methods to extract security and reliability properties, and the support of configurable operating system and middleware. Our approach is to demonstrate such a set of integrated techniques that span entire system hierarchy: processor hardware, operating system, middleware, and application.
安全性和可靠性是构建高度可信系统的关键属性。系统安全违规(例如,未经授权的特权访问或对数据完整性的损害)和可靠性故障可能由硬件问题(瞬态或间歇)、软件错误、资源耗尽、环境条件或这些因素之间的任何复杂交互引起。为了构建一个真正值得信赖的系统,设计师必须找到减轻(避免和容忍)意外错误和恶意攻击的方法。可信ILLIAC ^1是一个可靠和安全的集群计算平台,由伊利诺伊大学协调科学实验室(CSL)和信息信任研究所(ITI)建立,涉及电气与计算机工程和计算机科学系的教师。可信的ILLIAC旨在成为一个大型的、明显值得信赖的集群计算系统,以支持各种称为按需/效用计算或自适应企业计算的东西。这样的系统需要大量的应用程序共存,并使用各种包含边界共享硬件/软件资源。当前的解决方案旨在提供硬件和软件解决方案,这些解决方案只能被描述为一刀切的方法。今天的环境很复杂,实现起来很昂贵,而且几乎不可能验证。挑战在于以完全透明的方式提供特定于应用程序的可靠性和安全性级别,同时提供最佳性能。一种很有前景的方法是开发一组新的应用程序感知方法,这些方法提供自定义的信任级别(由应用程序指定),使用集成方法强制执行,包括可重新编程的硬件、增强的编译器方法以提取安全性和可靠性属性,以及对可配置操作系统和中间件的支持。我们的方法是演示一组跨越整个系统层次结构的集成技术:处理器硬件、操作系统、中间件和应用程序。
{"title":"Application-Aware Reliability and Security: The Trusted ILLIAC Approach","authors":"R. Iyer","doi":"10.1109/NCA.2006.15","DOIUrl":"https://doi.org/10.1109/NCA.2006.15","url":null,"abstract":"Security and reliability are the key attributes in building highly trusted systems. System security violations (e.g., unauthorized privileged access or the compromising of data integrity) and reliability failures can be caused by hardware problems (transient or intermittent), software bugs, resource exhaustion, environmental conditions, or any complex interaction among these factors. To build a truly trustworthy system, the designer must find ways to mitigate (avoid and tolerate) against accidental errors and malicious attacks. Trusted ILLIAC ^1 is a reliable and secure clustercomputing platform being built at the University of Illinois Coordinated Science Laboratory (CSL) and Information Trust Institute (ITI), involving faculty from Electrical and Computer Engineering and Computer Science Departments. Trusted ILLIAC is intended to be a large, demonstrably trustworthy cluster-computing system to support what is variously referred to as on-demand/utility computing or adaptive enterprise computing. Such systems require that a significant number of applications co-exist and share hardware/software resources using a variety of containment boundaries. Current solutions aim at providing hardware and software solutions that can only be described as a one-size-fits-all approaches. Today’s environments are complex, expensive to implement, and nearly impossible to validate. The challenge is to provide an application-specific level of reliability and security in a totally transparent manner, while delivering optimal performance. A promising approach lies in developing a new set of application-aware methods that provide customized levels of trust (specified by the application) enforced using an integrated approach involving reprogrammable hardware, enhanced compiler methods to extract security and reliability properties, and the support of configurable operating system and middleware. Our approach is to demonstrate such a set of integrated techniques that span entire system hierarchy: processor hardware, operating system, middleware, and application.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges in Managing Complexity: Autonomic Computing 管理复杂性的挑战:自主计算
Pub Date : 2006-07-24 DOI: 10.1109/NCA.2006.17
A. Ganek
Summary form only given. This paper explores the issues faced by enterprises in managing the complexity of information technology as well as progress in emerging autonomic technologies to address them. The paper considers the balance between technology automation and IT processes and human interactions with the management of technology. Recent trends in system management architecture, tools, and standards would be described and promising areas of research highlighted
只提供摘要形式。本文探讨了企业在管理信息技术复杂性方面所面临的问题,以及新兴自主技术的进展。本文考虑了技术自动化和IT流程之间的平衡以及人与技术管理之间的交互。将描述系统管理架构、工具和标准的最新趋势,并强调有前途的研究领域
{"title":"Challenges in Managing Complexity: Autonomic Computing","authors":"A. Ganek","doi":"10.1109/NCA.2006.17","DOIUrl":"https://doi.org/10.1109/NCA.2006.17","url":null,"abstract":"Summary form only given. This paper explores the issues faced by enterprises in managing the complexity of information technology as well as progress in emerging autonomic technologies to address them. The paper considers the balance between technology automation and IT processes and human interactions with the management of technology. Recent trends in system management architecture, tools, and standards would be described and promising areas of research highlighted","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experience with some Principles for Building an Internet-Scale Reliable System 构建互联网规模可靠系统的若干原则体会
Pub Date : 2005-12-13 DOI: 10.1109/NCA.2006.24
Mike Afergan
Summary form only given. We discuss the design methodology used to achieve commercial-quality reliability in the Akamai content delivery network. The network consists of 15,000+ servers in 1,100+ networks and spans 65+ countries. Despite the scale of the Akamai CDN and the unpredictable nature of the underlying Internet, we seek to build a system of extremely high reliability. We present some simple principles we use to assure high reliability, and illustrate their application. As there is some similarity-in-spirit between our implementation and recent trends in the research literature, we hope that sharing our experiences would be of value to a broad community
只提供摘要形式。我们讨论了在Akamai内容交付网络中实现商业质量可靠性的设计方法。该网络由1,100多个网络中的15,000多个服务器组成,覆盖65多个国家。尽管Akamai CDN的规模和基础互联网的不可预测性质,我们寻求建立一个极高可靠性的系统。我们提出了一些保证高可靠性的简单原则,并举例说明了它们的应用。由于我们的实现与研究文献中的最新趋势在精神上有一些相似之处,我们希望分享我们的经验对广泛的社区有价值
{"title":"Experience with some Principles for Building an Internet-Scale Reliable System","authors":"Mike Afergan","doi":"10.1109/NCA.2006.24","DOIUrl":"https://doi.org/10.1109/NCA.2006.24","url":null,"abstract":"Summary form only given. We discuss the design methodology used to achieve commercial-quality reliability in the Akamai content delivery network. The network consists of 15,000+ servers in 1,100+ networks and spans 65+ countries. Despite the scale of the Akamai CDN and the unpredictable nature of the underlying Internet, we seek to build a system of extremely high reliability. We present some simple principles we use to assure high reliability, and illustrate their application. As there is some similarity-in-spirit between our implementation and recent trends in the research literature, we hope that sharing our experiences would be of value to a broad community","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123941286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services 基于本体领域建模的电子商务安全服务安全体系结构风险评估多智能体系统工程框架
Pub Date : 2004-08-30 DOI: 10.1109/NCA.2004.1347810
G. Torrellas
One of the main objectives of a truly user-friendly information security architecture is to focus on advanced security assessment procedures technologies enabling cost-effective interchange across e-commerce security services and more natural interfaces to security services. The recently launched Information Security project at Mexican Oil Institute is rightly in that direction and the work addresses basically, security assessment technologies and its use in the key sector of e-business and electronic commerce. In particular, we are developing SAMARA (secure architecture multi-agent systems risk assessment) platform in order to adding a flexible quality of services security requirements (QoSSR) to all stages of the information security cycle, including security assessment management systems (SAMS) content generation and maintenance, automated translation and interpretation and enhancing the natural interactivity and usability of the security services with unconstrained security policy input. On the knowledge engineering side, the SAMARA ontologies provide a consensual representation of the secure electronic commerce field in three typical domains (CRM - customer relationship management, e-mail transactions, e-business transactions) allowing the exchanges independently of the security policy of the end user, the security services, or the content provider. This work concentrates on architectural issues, while the used security assessment procedures processing approaches has been developed in other author's papers.
真正用户友好的信息安全体系结构的主要目标之一是关注先进的安全评估程序技术,从而实现跨电子商务安全服务的经济有效的交换,以及与安全服务的更自然的接口。墨西哥石油研究所最近启动的信息安全项目正朝着这个方向发展,其工作主要涉及安全评估技术及其在电子商务和电子商务关键部门中的应用。特别是,我们正在开发SAMARA(安全架构多代理系统风险评估)平台,以便在信息安全周期的各个阶段增加灵活的服务质量安全要求(QoSSR),包括安全评估管理系统(SAMS)内容生成和维护,自动翻译和口译,以及通过不受约束的安全策略输入增强安全服务的自然交互性和可用性。在知识工程方面,SAMARA本体在三个典型领域(CRM—客户关系管理、电子邮件交易、电子商务交易)中提供安全电子商务领域的一致表示,允许独立于最终用户、安全服务或内容提供者的安全策略的交换。这项工作集中在架构问题上,而使用的安全评估程序处理方法已经在其他作者的论文中开发出来。
{"title":"A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services","authors":"G. Torrellas","doi":"10.1109/NCA.2004.1347810","DOIUrl":"https://doi.org/10.1109/NCA.2004.1347810","url":null,"abstract":"One of the main objectives of a truly user-friendly information security architecture is to focus on advanced security assessment procedures technologies enabling cost-effective interchange across e-commerce security services and more natural interfaces to security services. The recently launched Information Security project at Mexican Oil Institute is rightly in that direction and the work addresses basically, security assessment technologies and its use in the key sector of e-business and electronic commerce. In particular, we are developing SAMARA (secure architecture multi-agent systems risk assessment) platform in order to adding a flexible quality of services security requirements (QoSSR) to all stages of the information security cycle, including security assessment management systems (SAMS) content generation and maintenance, automated translation and interpretation and enhancing the natural interactivity and usability of the security services with unconstrained security policy input. On the knowledge engineering side, the SAMARA ontologies provide a consensual representation of the secure electronic commerce field in three typical domains (CRM - customer relationship management, e-mail transactions, e-business transactions) allowing the exchanges independently of the security policy of the end user, the security services, or the content provider. This work concentrates on architectural issues, while the used security assessment procedures processing approaches has been developed in other author's papers.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
IEEE International Symposium on Network Computing and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1