CLOUD COMPUTING AUDIT

Size: px
Start display at page:

Download "CLOUD COMPUTING AUDIT"

Transcription

1 U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 3, 2015 ISSN CLOUD COMPUTING AUDIT Georgana MATEESCU 1, Valentn SGÂRCIU 2 Ths paper presents a personal approach of conductng the audt process n cloud archtecture. Startng from the cloud computng benefts, we presented n Introducton secton the man characterstcs that a cloud provder should offer to hs consumer n exchange for credblty and trust. In order to prove all these capabltes, a proper audt process must be mplemented. Secton 2 descrbes our orgnal methodology of evaluatng the safety level of a cloud servce and the complance level aganst the standards used as reference. Our personal contrbutons consstng n quantfyng the safety level based on assumed rsk level were valdated by the mplementaton depcted n secton three. Ths paper concludes wth the benefts of our methodology. Keywords: cloud computng governance, cloud audt, cloud strategy, cloud evaluaton 1. Introducton Cloud Computng s a very fashonable concept and n the same tme, a controversal one. Whle a lot of people refer t as a dsruptve technology that has the potental to enhance collaboraton, aglty, scalng, and avalablty, and provdes the opportuntes for cost reducton through optmzed and effcent computng [1], there are a lot of opnons that thnk cloud computng s a trap for users to become cloud provder dependent [2]. The man attrbutes of cloud computng phenomenon are [3]: Shared resources cloud computng s an archtecture that allows multple users to utlze the same resources from network level, host level to applcaton level. Massve scalablty cloud computng has the ablty to scale to thousands of systems. Elastcty n cloud computng framework t s very easy to adapt the resources hardware and software to the user s necessty. Pay as you go users pay only the resources they use for only the tme they actually requre them. 1 PhD Student, Faculty of Automatc Control and Computers, Unversty POLITEHNICA of Bucharest, Romana, e-mal: georgana.mateescu@gmal.com 2 Professor, Faculty of Automatc Control and Computers, Unversty POLITEHNICA of Bucharest, Romana

2 32 Georgana Mateescu, Valentn Sgârcu Self provsonng of resources addtonal systems (processng capablty, software, storage) and network resources are added f needed. Cloud Computng represents a new archtectural model that lead to new governance and management strateges based on the trust between consumers and provders. The trust t s defned by the level of securty confdence a provder can offer to hs clents, confdence that must ensure the followng key factors [4]: Transparency n provng a hgh level of securty measures mplementaton that assures the proper use of confdental data durng ther entre lfecycle: create, share, use, archve, destroy stages. Prvacy the cloud servces must prevent, detect and react to securty breaches and malcous attacks n a tmely and effectve manner. Complance the cloud provder must prove complance wth the securty standards and regulatons. One of the most mportant aspects regardng ths topc s to ensure that the cloud consumer s able to retreve hs data from the cloud whenever s requred. Localzaton of data the physcal locaton of the data storage can be the subject of partcular regulaton s some geographc area, therefore the consumer must ensure proper cloud provder selecton f hs actvty s n scope for such standards. In order to prove that the cloud servce s complant wth technology and securty requrements, a proper audt process must be conduct. In ths paper, we present our personal approach n defnng an effectve audt methodology, able to quantfy the cloud servce safety and complance based on the key drvers from the man areas concernng the IT nfrastructure: governance, management, operatons. Startng from the COBIT [5] framework we have created an orgnal approach to evaluate the safety of a cloud servce n order to emphasze the man areas where enhancements are requred. The next secton descrbes the cloud audt methodology together wth the evaluaton algorthm. The thrd secton presents the practcal mplementaton for methodology valdaton. Ths paper concludes wth the man advantages and benefts of the presented approach. 2. Cloud Audt Process The Cloud Audt s a relatvely young doman that s beng enhanced by the cloud practces and standardzaton communtes n order to address all partcular ssues of the knd of archtectural model. The current practce, started from the IT tradtonal securty and control measures are based on these, the audt process s beng contnuously customzed on the cloud specfc partculartes. In order to create ths approach, we started from the exstng prncples, best practces and recommendatons regardng audt process, we mapped the tradtonal archtectures wth the cloud models n order to defne the man

3 Cloud computng audt 33 vertcals for the cloud audt specfc characters and for all these vertcals we classfed them nto domans. The categorzaton was performed accordng to the securty reference model defned n [7]. For all the vertcals we defned controls able to measure them. After defnng the audt context and aspects to evaluate, we bult our evaluaton methodology based on COBIT [5] model that offers a framework used to assess the governance and the management of IT. The framework was ntally desgned on tradtonal archtecture, but t can be adapted to cloud archtectures also. The capablty model leveraged by our methodology s depcted n the pcture below: Fg 1: COBIT capablty model [5] In order to conduct the audt process, we structured the exstng IT key prncples [6], practces, mechansms, procedures and controls n 14 domans, accordng to [7]. The audt process addresses one cloud applcaton that s evaluated from one or multple securty domans perspectve [8] [9], by analyzng the mplementaton level of each control defned n the audt questonnare for that doman. The audt report conssts n two man drvers: The safety level ths represents the level of securty controls mplementatons as compared to the assumed rsk defned for the applcaton that s been evaluated. The complance level ths represents the percentage of the securty coverage n the analyzed domans as they are defned by CSA n [7].

4 34 Georgana Mateescu, Valentn Sgârcu In order to compute the Safety Level, the approach defnes the applcaton rsk as the uncertanty rate reported to the cloud vulnerabltes from the analyzed securty doman, materalzed n the mplementaton level of each control: AR n = cnsa + k =1 Where: AR s the applcaton rsk for the evaluated doman ( 5 s ) c (1) c NSA s the correcton rsk constant computed based on the exstng cloud communty experence. Its value s 0.01 and t s ntroduces for practcal reasons because there s no doman wth zero rsk. s k s the score of the mplementaton level for control k from the doman c A s the correcton constant appled to the rsk defned for the control. Ths constant depends on the ndustry the target belongs to, and on the senstvty level of the cloud servce. n s the number controls beng evaluated n the audt process For each cloud applcaton, there s an assumed level of rsk ranked from 1 to 3, defned by the IT strategy and management responsble team. Based on the assumed level of rsk, the assumed rsk s computed usng the followng expresson: ' AR = RL n c A (2) Where: AR ' s the assumed rsk for the evaluated doman RL s the rsk level defned by the management responsble team c A s the correcton constant appled to the rsk defned for the control. Ths constant depends on the ndustry the target belongs to, and on the senstvty level of the cloud servce. n s the number controls beng evaluated n the audt process Based on these two measures, the safety level s computed as: AR 5 n(1 c ) A ' = AR SL 100 5n (3) Where: SL s the safety level for the evaluated doman c A s the correcton constant appled to the rsk defned for the control. Ths constant depends on the ndustry the target belongs to, and on the senstvty level of the cloud servce. AR ' s the assumed rsk for the evaluated doman AR s the applcaton rsk for the evaluated doman k A

5 Cloud computng audt 35 n s the number controls beng evaluated n the audt process If the audt process s conducted for multple domans, the safety level s the arthmetc mean of the safety levels of the ndvdual domans: n SL SL = = 1 (4) n Where: SL s the safety level of the audt process SL s the safety level for the evaluated doman n s the number of domans n scope for the audt process. Based on the safety level and on the assumed rsk level, the Complance Level s computed usng the followng expresson: c 1+ ( 1) SL SLmn CL = ( SLmn + ) (5) 2 SLmn Where: CL s the complance level for the evaluated doman SL s the safety level for the evaluated doman n s the number of domans n scope for the audt process c s the complance factor that ensure that the complance level s zero f the mnmum safety level s not reached. Ths factor s computed usng the followng expresson: 1, SL < SLmn c = (5) 2, SL > SLmn SL mn s the mnmum safety level that must be obtaned by a doman n order to be complant and t s computed based on the assumed level of rsk: SL = 1 RL Where: SL mn s the mnmum safety level mn c c (6) RL s the assumed rsk level for the applcaton c c s the complance constant and ts value s 0.25 The complance level s the measure of the mplemented level of securty and governance measures, as compared to the best practces recommended by the standards used as references when we defned the audt framework. Therefore the two levels computed by our approach offer a realstc vew of the contracted cloud servce by analyzng the entre ntegraton context. Our approach analyzes both cloud provder and consumer controls n order to evaluate the level of performance, governance, rsk, management and operaton of the IT doman.

6 36 Georgana Mateescu, Valentn Sgârcu 3. Implementaton the audt process In order to valdate the proposed methodology we used the followng archtecture: Fg 2: Implementaton Archtecture The IT envronment components are: The Identty Management System n charge wth the management of the enterprse users and accounts n target systems. Ths system retreves denttes attrbutes from Drectory Server system and, based on defned busness rules, provsons the cloud servce through APIs calls. The communcaton between Identty Management and salesforce.com s authentcated and the nformaton flow s encrypted by the Securty Gateway. Identty Management s the system that manages the users and the roles wthn salesforce.com.. The Drectory Server system s the authortatve source of denttes attrbutes n the company and provdes all employees detals to Identty Management system. Identty Federaton and Sngle Sgn On system s the system n charge wth the authentcaton process wthn the company. The repostory for the dentty federaton s Drectory Server Securty Gateway s the system n charge wth the encrypton of data n moton nvolved n the ntegraton wth salesforce. Salesforce.com s the cloud servce that s been audt and has the followng characterstcs depcted by the Table 1 below.

7 Cloud computng audt 37 The audted applcaton characterstcs No Characterstc Value 1 Applcaton Name Salesforce.com 2 Senstve Applcaton No 3 Nvel de Rsc Asumat 2 4 Implementaton Program Salesforce 5 Cloud Servce Type SaaS 6 Cloud Model Cloud Publc Table 1 Durng the audt process we addressed 11 domans out of 14 because these were the most relevant ones: Governance and Enterprse Rsk Management [14] Tradtonal Securty, Busness Contnuty and Dsaster Recovery [13] Complance and Audt [18] Portablty and Interoperablty [17] Incdent Response, Notfcaton and Remedaton [13] Applcaton Securty [11] Encrypton and Key Management [18] Identty and Access Management[15] Vrtualzaton [16] Data Center Operatons [19] Informaton Management and Data Securty [12] Doman The table below depcts the audt results: Audt Results No of App Controls Rsk Assumed Rsk Safety Level Governance and Enterprse Rsk Management Tradtonal Securty, Busness Contnuty and Dsaster Recovery Complance and Audt Portablty and Interoperablty Incdent Response, Notfcaton and Remedaton Table 2

8 38 Georgana Mateescu, Valentn Sgârcu Doman No of Controls App Rsk Assumed Rsk Safety Level Applcaton Securty Encrypton and Key Management Identty and Access Management Vrtualzaton Data Center Operatons Informaton Management and Data Securty Total Number of Controls 262 Safety Level The followng pcture depcts the rato between the Applcaton Rsk computed durng the audt process and the Assumed rsk for the analyzed domans: Fg 3 Raton between Applcaton Rsk and Assumed Rsk The pcture shows that the domans where the audted applcaton rsk exceeded than the assumed rsk are: Incdent Response, Notfcaton and Remedaton Applcaton Securty Encrypton and Key Management

9 Cloud computng audt 39 For these domans, the company wll have to enhace the exstng controls n order to ensure that the rsk s addressed properly and the busness requrements regadng avalablty and audtablty are met. The pcture below depcts the comparson between the safety level computed durng the audt process for all n scope domans: Fg 4: Safety Levels The level of safety of the audted applcaton s SL = 97%. Consderng that the assumed level of rsk s RL = 2 and that the applcaton s not consdered senstve, the mnmum safety level that must be met n order for one doman to be complant s: SL 1 RL c 95% (7) mn = c = Based on the mnmum safety level, the conformty level s computed for each n scope doman and the results are presented n the pcture below: Fg 5: Conformty Levels for the analyzed domans We can conclude that 10 out of 11 analyzed domans are complant wth the best practces recommended by the standards used as references n the audt

10 40 Georgana Mateescu, Valentn Sgârcu approach. The only doman that was not complant s Portablty and Interoperablty whch safety level s 94.62%. Ths means that the efforts for performng the enhancement requred for complance are not sgnfcant as the dfference untl the mnmum safety level n very small. The mean complance level for the 10 complant domans s: 10 CL = 1 CL = 100 = 97.7% (8) 10 We can conclude that the audted servce cloud s a safe servce, wth the safety level of 97% that proves the hgh performance securty and control mechansms n place n order to ensure transparency, prvacy, avalablty and requred performance. In the archtecture we audt, the salesforce.com was complant n 10 domans out of 11, fact that leads to a 90.9% percentage of complance. As already mentoned, the dfference between the safety level on the non-complant doman and the mnmum safety level requred for complance s small, therefore the overall evaluaton of salesforce.com s classfyng ths servce as a safe, controllable and hgh performance cloud servce. By mplementng ths use case we proved the practcal applcablty of our approach n evaluatng the cloud servce form the followng perspectves: Securty controls n place n the archtecture on both costumer and provder sde Governance and rsk management measures Operablty processes and procedures 6. Conclusons Nowadays the nformaton securty and proftablty are maybe the most mportant two aspects wthn an organzaton. They are nterconnected and have a drect mpact one on each other and because of that the man challenge today s to fnd the best balance between the cost spent on the securty aspects and ther proftablty. In order to ensure the maxmzed busness value added by mplementng IT programs, the companes must buld a strong audt process able to quantfy the safety of the IT soluton mplemented, the proftablty rate and the IT strategy maturty. By combnng techncal aspects [10] dved nto man securty drvers wth governance and operatons related factors, we managed to offer a full evaluaton analyss of cloud system that quantfes the overall safety of the cloud safety from both technologcal and operatonal perspectve. In ths way, the audt process can be a key decson support for the IT strategy roadmap.

11 Cloud computng audt 41 Our approach offers the followng benefts and nnovatons: Quantfes the safety score based on securty measures and controls usng an orgnal methodology based on mature and relable framework. Quantfes the level of complance wth the standards used as reference n defnng the audt framework. The approach reles of the safety score and t s bult by adaptng the tradtonal methodology to cloud archtectures. Offers an effcent methodology for complex analyss that shows strengths and weaknesses of the company Offers decson support for future cloud adopton by evaluatng the rate of company maturty and adaptablty to change by assessng the entre stack of mechansms, controls, process and procedures defned wthn the company n order to obtan an effcent governance and management process. By usng as a reference model an nternatonal standard, we ensure that the prncpals, best practces and mature recommendatons are part of the audt process. Also, by leveragng an exstng framework for ntal assessment of the mplementaton level, we obtan all the benefts of a framework that proved ts value durng the experence. We can conclude that our approach helps the company gan vsblty on ther own IT envronment by evaluatng the governance, management and operatons maturty levels usng a holstc approach. R E F E R E N C E S [1] Cloud Securty Allance, Securty Gudance for Crtcal Areas of Focus n Cloud Computng v [2] Mchael Armbrust, Armando Fox, Rean Grffth, Anthony D. Joseph, Randy Katz, Andy Konwnsk, Gunho Lee, Davd Patterson, Arel Rabkn, Ion Stoca, and Mate Zahara, Above the Clouds: A Berkeley Vew of Cloud Computng Electrcal Engneerng and Computer Scences Unversty of Calforna at Berkeley Techncal Report February 10, 2009 [3] Tm Mather, Subra Kumaraswany, Shahed Latf, Cloud Securty and Prvacy. An Enterprse Perspectve on Rsk and Complance, O Relly Unted States of Amerca, frst verson 2009 [4] Robert R. Moeller, Executve's Gude to IT Governance: Improvng Systems Processes wth Servce Management, COBIT, and ITIL, 2013 John Wnley & Sons ISBN: [5] ISACA, COBIT 5: A Busness Framework for the Governance and Management of Enterprse IT, 2012, ISACA ISBN: [6] ISACA, IT Control Objectves for Cloud Computng: Controls and Assurance n the Cloud, 2011, ISACA ISBN: [7] Cloud Securty Allance, Securty Gudance for crtcal areas of focus n cloud computng v3.0, [8] Robert R. Moeller, Executve's Gude to IT Governance: Improvng Systems Processes wth Servce Management, COBIT, and ITIL, 2013 John Wnley & Sons ISBN:

12 42 Georgana Mateescu, Valentn Sgârcu [9] Jared Carstensen, Bernard Golden, JP Morgenthal, Cloud Computng: Assessng the Rsks, 2012, IT Governance ISBN: [10] Chrs Davs, Mke Schller, Kevn Wheeler, IT Audtng: Usng Controls to Protect Informaton Assets, Second Edton, 2011 McGraw-Hll/Osborne ISBN: [11] Lee Newcombe, Securng Cloud Servces: A Pragmatc Approach to Securty Archtecture n the Cloud, 2012, IT Governance ISBN: [12] Jennfer L. Bayuk,Cyber Securty Polcy Gudebook, 2012, John Wley & Sons ISBN: [13] Kurt J. Engemann and Douglas M. Henderson, Busness Contnuty and Rsk Management: Essentals of Organzatonal Reslence, 2012, Rothsten Assocates ISBN: [14] Robert R. Moeller, COSO Enterprse Rsk Management: Establshng Effectve Governance, Rsk, and Complance, Second Edton, 2011, John Wley & Sons ISBN: [15] Matthew Metheny, Federal Cloud Computng: The Defntve Gude for Cloud Servce Provders, 2013, Syngress Publshng ISBN: [16] Dane Barrett and Greg Kpper, Vrtualzaton and Forenscs: A Dgtal Forensc Investgator's Gude to Vrtual Envronments, 2010 Syngress Publshng ISBN: [17] Nck Antonopoulos, Lee Gllam, Cloud Computng: Prncples, Systems and Applcatons, 2010, Sprnger ISBN: [18] Ben Halpert, Audtng Cloud Computng: A Securty and Prvacy Gude, 2011, John Wley & Sons ISBN: [19] Bran J.S. Chee, Curts Frankln, Cloud Computng: Technologes and Strateges of the Ubqutous Data Center, 2010, Auerbach Publcatons ISBN:

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

One Click.. Ȯne Location.. Ȯne Portal...

One Click.. Ȯne Location.. Ȯne Portal... New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Getting It Together Project & Implementation Management

Getting It Together Project & Implementation Management Gettng It Together Project & Implementaton Management CFE NETWORKING November 30, 2011 Fnancng NFA Fshng Best Practces Tranng & Mentorng Marketng & Brandng Governance Markets Fsh Legal Regulaton ? HR

More information

CONTENTS Introduction... 3

CONTENTS Introduction... 3 Cuty ourm c r os of t Ex c hangeser v er s t or agec os t sbyupt o85% Howema lar c h v ngs ol ut onsex pand y ournat v eema lappl c at on' sc apab l t es CONTENTS Introducton... 3 Emal Storage Management...

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:

More information

Enterprise Content Management

Enterprise Content Management Enterprse Content Management for the Laboratory Jm Mller Drector of Informatcs and Software Aglent Technologes Branden Humphrey Global Data Archve Program Manager Pfzer Global Research The content exploson

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Computer-assisted Auditing for High- Volume Medical Coding

Computer-assisted Auditing for High- Volume Medical Coding Computer-asssted Audtng for Hgh-Volume Medcal Codng Computer-asssted Audtng for Hgh- Volume Medcal Codng by Danel T. Henze, PhD; Peter Feller, MS; Jerry McCorkle, BA; and Mark Morsch, MS Abstract The volume

More information

Adobe Security Training

Adobe Security Training Adobe Securty Tranng Whte Paper Adobe Securty Tranng Table of Contents 1 Adobe Securty 1 The Adobe Securty Organzaton 2 Adobe Secure Product Development 3 ASSET Software Securty Certfcaton Program 5 Securty

More information

Introduction CONTENT. - Whitepaper -

Introduction CONTENT. - Whitepaper - OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information

National Security Agency Information Assurance Directorate

National Security Agency Information Assurance Directorate Natonal Securty Agency Informaton Assurance Drectorate Net-Centrc Enterprse Servces (NCES) Profle of Web Servce Securty: Smple Object Access Protocol (SOAP) Message Securty (WSSE) 02 MAY 2008 Prepared

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

PRODUCT AND SERVICES OVERVIEW. The elements for assessing and growing leadership talent

PRODUCT AND SERVICES OVERVIEW. The elements for assessing and growing leadership talent PRODUCT AND SERVICES OVERVIEW The elements for assessng and growng leadershp talent 1 Who s The Booth Company? We are the publsher and admnstrator of 360 degree feedback surveys based on the Task Cycle,

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Resource Management and Organization in CROWN Grid

Resource Management and Organization in CROWN Grid Resource Management and Organzaton n CROWN Grd Jnpeng Hua, Tanyu Wo, Yunhao Lu Dept. of Computer Scence and Technology, Behang Unversty Dept. of Computer Scence, Hong Kong Unversty of Scence & Technology

More information

Global innovative solutions You can rely on. www.calyon.com

Global innovative solutions You can rely on. www.calyon.com Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary

LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement

More information

Virtual Enterprises - Building Blocks for Dynamic e-business. Kumar Bhaskaran IBM Watson Research Center bha@us.ibm.com

Virtual Enterprises - Building Blocks for Dynamic e-business. Kumar Bhaskaran IBM Watson Research Center bha@us.ibm.com Vrtual Enterprses - Buldng Blocks for Dynamc e-busness Ntn Nayak IBM Watson Research Center nnayak@us.bm.com Kumar Bhaskaran IBM Watson Research Center bha@us.bm.com Raja Das IBM Software Dvson rajadas@us.bm.com

More information

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING 1 MS. POOJA.P.VASANI, 2 MR. NISHANT.S. SANGHANI 1 M.Tech. [Software Systems] Student, Patel College of Scence and

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Prediction Model for Characteristics of Implementation of Information Systems in Small and Medium Enterprises

Prediction Model for Characteristics of Implementation of Information Systems in Small and Medium Enterprises Predcton Model for Characterstcs of Implementaton of Informaton Systems n Small and Medum Enterprses I. Nazor, K. Fertalj, and D. Kalpc Abstract The process of choosng an Enterprse Resource Plannng (ERP)

More information

Partner selection of cloud computing federation based on Markov chains

Partner selection of cloud computing federation based on Markov chains COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Towards Specialization of the Contract-Aware Software Development Process

Towards Specialization of the Contract-Aware Software Development Process Towards Specalzaton of the Contract-Aware Software Development Process Anna Derezńska, Przemysław Ołtarzewsk Insttute of Computer Scence, Warsaw Unversty of Technology, Nowowejska 5/9, 00-665 Warsaw, Poland

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Data security in Intelligent Transport Systems

Data security in Intelligent Transport Systems Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Electronic Document Management

Electronic Document Management tem no 14- THE CTY OF EDNBURGH COUNCL Electronc Document Management Executve of the Councl 7th October 2003 y. 1 1. 2 2.1 2.2 2.3 2.4 2.5 Purpose of report To approve a preferred suppler and proposed way

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Objectives How Can Pharmacy Staff Add to the Accountability of ACO s?

Objectives How Can Pharmacy Staff Add to the Accountability of ACO s? Objectves How Can Pharmacy Staff Add to the Accountablty of ACO s? Sandra Van Trease Group Presdent, BJC HealthCare Presdent, BJC HealthCare ACO, LLC The speaker has no conflct of nterest to declare. 1.

More information

Assessment of the legal framework

Assessment of the legal framework 46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

Auditing Cloud Service Level Agreement on VM CPU Speed

Auditing Cloud Service Level Agreement on VM CPU Speed Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,

More information

A MODEL-BASED REPOSITORY FOR OPEN SOURCE SERVICE AND COMPONENT INTEGRATION

A MODEL-BASED REPOSITORY FOR OPEN SOURCE SERVICE AND COMPONENT INTEGRATION A MODEL-BASED REPOSITORY FOR OPEN SOURCE SERVICE AND COMPONENT INTEGRATION Rodrgo García-Carmona, Félx Cuadrado, Juan C. Dueñas Departamento de Ingenería de Sstemas Telemátcos, ETSI Telecomuncacón, Unversdad

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

Daily Mood Assessment based on Mobile Phone Sensing

Daily Mood Assessment based on Mobile Phone Sensing 2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

WhitePaper: Security "Point" Solutions are Not a 4 Letter Word:

WhitePaper: Security Point Solutions are Not a 4 Letter Word: Securty "Pont" Solutons are Not a 4 Letter Word: Why Purpose-Bult Solutons for Patch and Confguraton Management Contnue to be a Good Thng Securty "Pont" Solutons are Not a 4 Letter Word: In recent years

More information

Mission Oriented Business Integration Services (MOBIS) FSC Group: 874 Class: R499

Mission Oriented Business Integration Services (MOBIS) FSC Group: 874 Class: R499 General Servces Admnstraton Federal Supply Servce Authorzed Federal Supply Schedule Prce Lst Msson Orented Busness Integraton Servces (MOBIS) FSC Group: 874 Class: R499 On-lne access to contract orderng

More information

A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server

A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 2, JUNE 2013 187 A Genetc Algorthm Based Approach for Campus Equpment Management System n Cloud Server Yu-Cheng Ln Abstract In ths paper, we proposed

More information

Fixed income risk attribution

Fixed income risk attribution 5 Fxed ncome rsk attrbuton Chthra Krshnamurth RskMetrcs Group chthra.krshnamurth@rskmetrcs.com We compare the rsk of the actve portfolo wth that of the benchmark and segment the dfference between the two

More information

Selecting Best Employee of the Year Using Analytical Hierarchy Process

Selecting Best Employee of the Year Using Analytical Hierarchy Process J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add. chapter 8 Vctm assstance 385 Tool 8.3 Protecton, assstance and human rghts Overvew Ths tool dscusses the human rghts consderatons whch must be borne n mnd n protectng and assstng vctms of traffckng. Recommended

More information

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

Draft. Evaluation of project and portfolio Management Information Systems with the use of a hybrid IFS-TOPSIS method

Draft. Evaluation of project and portfolio Management Information Systems with the use of a hybrid IFS-TOPSIS method Intellgent Decson Technologes 7 (2013) 91 105 91 DOI 10.3233/IDT-120153 IOS Press Evaluaton of project and portfolo Management Informaton Systems wth the use of a hybrd IFS-TOPSIS method Vassls C. Geroganns

More information

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event. Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up

More information

E-learning Vendor Management Checklist

E-learning Vendor Management Checklist E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information