Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (7)
- Computer Sciences (5)
- Electrical and Computer Engineering (5)
- Physical Sciences and Mathematics (5)
- Digital Communications and Networking (4)
-
- Computer and Systems Architecture (3)
- Data Storage Systems (2)
- Library and Information Science (2)
- Social and Behavioral Sciences (2)
- Business (1)
- Business Intelligence (1)
- Civil and Environmental Engineering (1)
- Communication (1)
- Communication Technology and New Media (1)
- Construction Engineering and Management (1)
- Databases and Information Systems (1)
- E-Commerce (1)
- Electrical and Electronics (1)
- Information Literacy (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Science and Technology Studies (1)
- Social Media (1)
- Software Engineering (1)
- Systems Architecture (1)
- Systems and Communications (1)
- Technology and Innovation (1)
- Institution
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Engineering
Security Evaluation Of Virtualized Computing Platforms, Ganesh Reddy Gunnam
Security Evaluation Of Virtualized Computing Platforms, Ganesh Reddy Gunnam
Theses and Dissertations
In this thesis, security experiments were conducted to evaluate embedded security protocol performance of two leading server operating systems, Apple’s MAC OS server LION Vs. Microsoft’s Windows server 2012 R2 OS under different types of security attack. Furthermore, experiments were conducted to understand and evaluate the effect of virtualization using Hyper-V with Windows 2012 R2 OS on MAC hardware platform. For these experiments, connection rate, connection latency, non-paged pool allocations and processor core utilization for different OS, virtual machines, and under different traffic types were measured.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Journal of International Technology and Information Management
Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …
Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter
Chaos-Based Encryption Keys And Neural Key-Store For Cloud-Hosted Data Confidentiality, N.N Mosola, M.T Dlamini, Jonathan Blackledge, J.H.P Eloff, H.S Venter
Conference papers
Cloud computing brings flexible and cost-effective services. However, security concerns plague the cloud. Data confidentiality is one of the security concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks directed towards gaining unauthorised access to cloud-bound or cloud-hosted data. This paper proposes a clientend encryption and key management system to curb cyberattacks that target compromising data confidentiality on the cloud.
Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman
Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman
Computer Engineering
No abstract provided.
Whiting-Turner Plangrid Implementation On Oakland Global Logistics Center: A Case Study, Alex J. Cain
Whiting-Turner Plangrid Implementation On Oakland Global Logistics Center: A Case Study, Alex J. Cain
Construction Management
As construction project complexity continues to rise, there will be an increasing importance placed on a company’s ability to manage project information. This management is aided by the use of project management information systems (PMIS). These systems are made up of applications that help managers track project progress from start to finish. Whiting-Turner uses the application Plangrid within their PMIS. This paper will explore how Whiting-Turner implements Plangrid on the currently being constructed Oakland Global Logistics Center. In addition, this paper will review the fundamental concepts behind a PMIS, the framework of mobile computing applications, and the features of leading …
Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal
Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal
Electronic Thesis and Dissertation Repository
Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Information Science Faculty Publications
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …
Hadoop Framework Implementation And Performance Analysis On A Cloud, Göksu Zeki̇ye Özen, Mehmet Tekerek, Rayi̇mbek Sultanov
Hadoop Framework Implementation And Performance Analysis On A Cloud, Göksu Zeki̇ye Özen, Mehmet Tekerek, Rayi̇mbek Sultanov
Turkish Journal of Electrical Engineering and Computer Sciences
The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method, jobs are processed by dividing into small pieces and distributing over nodes. Parameters such as distributing method over nodes, the number of jobs held in a parallel fashion, and the number of nodes in the cluster affect the execution time of jobs. The aim of this paper is to determine how the numbers of nodes, maps, and reduces affect the performance of …
Designing A Vm-Level Vertical Scalability Service In Current Cloud Platforms: A New Hope For Wearable Computers, Mustafa Kaiiali
Designing A Vm-Level Vertical Scalability Service In Current Cloud Platforms: A New Hope For Wearable Computers, Mustafa Kaiiali
Turkish Journal of Electrical Engineering and Computer Sciences
Public clouds are becoming ripe for enterprise adoption. Many companies, including large enterprises, are increasingly relying on public clouds as a substitute for, or a supplement to, their own computing infrastructures. On the other hand, cloud storage service has attracted over 625 million users. However, apart from the storage service, other cloud services, such as the computing service, have not yet attracted the end users' interest for economic and technical reasons. Cloud service providers offers horizontal scalability to make their services scalable and economical for enterprises while it is still not economical for the individual users to use their computing …
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …