Scientific cloud computing: Early definition and experience

L Wang, J Tao, M Kunze… - 2008 10th ieee …, 2008 - ieeexplore.ieee.org
Cloud computing emerges as a new computing paradigm which aims to provide reliable,
customized and QoS guaranteed computing dynamic environments for end-users. This …

Blockchain-based identity management and access control framework for open banking ecosystem

CH Liao, XQ Guan, JH Cheng, SM Yuan - Future Generation Computer …, 2022 - Elsevier
Financial institutions are following an open banking (OB) trend for service innovation and
integration. OB allows third-party service providers (TSPs) to access user financial data for …

Towards building a cloud for scientific applications

L Wang, M Kunze, J Tao, G von Laszewski - Advances in Engineering …, 2011 - Elsevier
The Cloud computing becomes an innovative computing paradigm, which aims to provide
reliable, customized and QoS guaranteed computing infrastructures for users. This paper …

Privacy-breaching patterns in NoSQL databases

K Goel, AHM Ter Hofstede - IEEE Access, 2021 - ieeexplore.ieee.org
NoSQL databases disrupted the database market when first introduced. Their contemporary
relevance has increased further in the era of big data due to the demands placed on (real …

[HTML][HTML] Self-adaptive federated authorization infrastructures

C Bailey, DW Chadwick, R de Lemos - Journal of Computer and System …, 2014 - Elsevier
Authorization infrastructures are an integral part of any network where resources need to be
protected. As networks expand and organizations start to federate access to their resources …

A mobile computing middleware for location-and context-aware internet data services

P Bellavista, A Corradi, R Montanari… - ACM Transactions on …, 2006 - dl.acm.org
The widespread diffusion of mobile computing calls for novel services capable of providing
results that depend on both the current physical position of users (location) and the logical …

LDAP injection techniques

JM Alonso, R Bordon, M Beltran… - 2008 11th IEEE …, 2008 - ieeexplore.ieee.org
The increase in the number of databases accessed only by some applications has made
code injection attacks an important threat to almost any current system. If one of these …

Immersive education spaces using Open Wonderland from pedagogy through to practice

M Gardner, A Gánem-Gutiérrez, J Scott… - Multi-user virtual …, 2011 - igi-global.com
This chapter presents a case study of the use of virtual world environment in UK Higher
Education. It reports on the activities carried out as part of the SIMiLLE (System for an …

Run-time generation, transformation, and verification of access control models for self-protection

C Bailey, L Montrieux, R de Lemos, Y Yu… - Proceedings of the 9th …, 2014 - dl.acm.org
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a
promising solution for the handling of malicious user behaviour in complex infrastructures. A …

[PDF][PDF] The cumulus project: Build a scientific cloud for a data center

L Wang, J Tao, M Kunze, D Rattu… - First workshop on …, 2008 - chinacloud.cn
Cloud computing emerges as a new computing paradigm which aims to provide reliable,
customized and QoS guaranteed dynamic computing environments for end-users. This …