Scientific cloud computing: Early definition and experience
L Wang, J Tao, M Kunze… - 2008 10th ieee …, 2008 - ieeexplore.ieee.org
Cloud computing emerges as a new computing paradigm which aims to provide reliable,
customized and QoS guaranteed computing dynamic environments for end-users. This …
customized and QoS guaranteed computing dynamic environments for end-users. This …
Blockchain-based identity management and access control framework for open banking ecosystem
Financial institutions are following an open banking (OB) trend for service innovation and
integration. OB allows third-party service providers (TSPs) to access user financial data for …
integration. OB allows third-party service providers (TSPs) to access user financial data for …
Towards building a cloud for scientific applications
L Wang, M Kunze, J Tao, G von Laszewski - Advances in Engineering …, 2011 - Elsevier
The Cloud computing becomes an innovative computing paradigm, which aims to provide
reliable, customized and QoS guaranteed computing infrastructures for users. This paper …
reliable, customized and QoS guaranteed computing infrastructures for users. This paper …
Privacy-breaching patterns in NoSQL databases
K Goel, AHM Ter Hofstede - IEEE Access, 2021 - ieeexplore.ieee.org
NoSQL databases disrupted the database market when first introduced. Their contemporary
relevance has increased further in the era of big data due to the demands placed on (real …
relevance has increased further in the era of big data due to the demands placed on (real …
[HTML][HTML] Self-adaptive federated authorization infrastructures
C Bailey, DW Chadwick, R de Lemos - Journal of Computer and System …, 2014 - Elsevier
Authorization infrastructures are an integral part of any network where resources need to be
protected. As networks expand and organizations start to federate access to their resources …
protected. As networks expand and organizations start to federate access to their resources …
A mobile computing middleware for location-and context-aware internet data services
The widespread diffusion of mobile computing calls for novel services capable of providing
results that depend on both the current physical position of users (location) and the logical …
results that depend on both the current physical position of users (location) and the logical …
LDAP injection techniques
JM Alonso, R Bordon, M Beltran… - 2008 11th IEEE …, 2008 - ieeexplore.ieee.org
The increase in the number of databases accessed only by some applications has made
code injection attacks an important threat to almost any current system. If one of these …
code injection attacks an important threat to almost any current system. If one of these …
Immersive education spaces using Open Wonderland from pedagogy through to practice
M Gardner, A Gánem-Gutiérrez, J Scott… - Multi-user virtual …, 2011 - igi-global.com
This chapter presents a case study of the use of virtual world environment in UK Higher
Education. It reports on the activities carried out as part of the SIMiLLE (System for an …
Education. It reports on the activities carried out as part of the SIMiLLE (System for an …
Run-time generation, transformation, and verification of access control models for self-protection
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a
promising solution for the handling of malicious user behaviour in complex infrastructures. A …
promising solution for the handling of malicious user behaviour in complex infrastructures. A …
[PDF][PDF] The cumulus project: Build a scientific cloud for a data center
L Wang, J Tao, M Kunze, D Rattu… - First workshop on …, 2008 - chinacloud.cn
Cloud computing emerges as a new computing paradigm which aims to provide reliable,
customized and QoS guaranteed dynamic computing environments for end-users. This …
customized and QoS guaranteed dynamic computing environments for end-users. This …