Software Architecture

Software Architecture
Author: Ivica Crnkovic
Publisher: Springer
Total Pages: 462
Release: 2011-09-15
Genre: Computers
ISBN: 3642237983

This book constitutes the refereed proceedings of the 5th European Conference on Software Architecture, ECSA 2011, held in Essen, Germany, in September 2011. The 13 revised full papers presented together with 24 emerging research papers, and 7 research challenge poster papers were carefully reviewed and selected from over 100 submissions. The papers are organized in topical sections on requirements and software architectures; software architecture, components, and compositions; quality attributes and software architectures; software product line architectures; architectural models, patterns and styles; short papers; process and management of architectural decisions; software architecture run-time aspects; ADLs and metamodels; and services and software architectures.

Trusted Systems

Trusted Systems
Author: Liqun Chen
Publisher: Springer
Total Pages: 374
Release: 2011-11-19
Genre: Computers
ISBN: 3642252834

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Author: Bryan Jeffrey Parno
Publisher: Morgan & Claypool Publishers
Total Pages: 177
Release: 2014-06-01
Genre: Computers
ISBN: 1627054790

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

e-Business and Telecommunications

e-Business and Telecommunications
Author: Mohammad S. Obaidat
Publisher: Springer
Total Pages: 454
Release: 2012-02-21
Genre: Computers
ISBN: 3642252060

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010. The 28 revised full papers presented together with 1 invited paper in this volume were carefully reviewed and selected from 422 initial submissions. They have passed two rounds of selection and improvement. According to the topics of the particular conference the papers are organized in thematical parts on data communication networking (DCNET), e-business (ICE-B), optical communication systems (OPTICS), security and cryptography (SECRYPT), signal processing and multimedia applications (SIGMAP), wireless information networks and systems (WINSYS).

Managing the Web of Things

Managing the Web of Things
Author: Michael Sheng
Publisher: Morgan Kaufmann
Total Pages: 484
Release: 2017-02-10
Genre: Computers
ISBN: 0128097655

Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things. The web has gone through many transformations, from traditional linking and sharing of computers and documents (i.e., Web of Data), to the current connection of people (i.e., Web of People), and to the emerging connection of billions of physical objects (i.e., Web of Things). With increasing numbers of electronic devices and systems providing different services to people, Web of Things applications present numerous challenges to research institutions, companies, governments, international organizations, and others. This book compiles the newest developments and advances in the area of the Web of Things, ranging from modeling, searching, and data analytics, to software building, applications, and social impact. Its coverage will enable effective exploration, understanding, assessment, comparison, and the selection of WoT models, languages, techniques, platforms, and tools. Readers will gain an up-to-date understanding of the Web of Things systems that accelerates their research. Offers a comprehensive and systematic presentation of the methodologies, technologies, and applications that enable efficient and effective management of the Internet of Things Provides an in-depth analysis on the state-of-the-art Web of Things modeling and searching technologies, including how to collect, clean, and analyze data generated by the Web of Things Covers system design and software building principles, with discussions and explorations of social impact for the Web of Things through real-world applications Acts as an ideal reference or recommended text for graduate courses in cloud computing, service computing, and more

Intelligent Information Access

Intelligent Information Access
Author: Giuliano Armano
Publisher: Springer Science & Business Media
Total Pages: 148
Release: 2010-06-23
Genre: Computers
ISBN: 364213999X

Written from a multidisciplinary perspective, Intelligent Information Access investigates new insights into methods, techniques and technologies for intelligent information access. The chapters are written by participants in the Intelligent Information Access meeting, held in Cagliari, Italy, in December 2008.

Advances in Web and Network Technologies and Information Management

Advances in Web and Network Technologies and Information Management
Author: Lei Chen
Publisher: Springer Science & Business Media
Total Pages: 261
Release: 2009-09-03
Genre: Computers
ISBN: 3642039952

This volume comprises papers from four APWeb/WAIM 2009 workshops, which are 1. International Workshop on Web-based Contents Management Technologies (WCMT 2009), 2. International Workshop on Real-Time Business Intelligence (RTBI 2009), 3. International Workshop on DataBase and Information Retrieval and Aspects in Evaluating Holistic Quality of Ontology-based Information Retrieval (DBIR-ENQOIR 2009), as well as 4. International Workshop on Process Aware Information Systems (PAIS 2009. These four workshops were selected from a public call-for-proposals process. The workshop organizers have put a tremendous amount of effort into soliciting and selecting research papers with a balance of high quality and new ideas and new applications.

The Personal Web

The Personal Web
Author: Mark Chignell
Publisher: Springer
Total Pages: 233
Release: 2013-07-15
Genre: Computers
ISBN: 3642399959

This book grew out of the First Symposium on the Personal Web, co-located with CASCON 2010 in Markham, Ontario, Canada. The purpose of the symposium was to bring together prominent researchers and practitioners from a diverse range of research areas relevant to the advancement of science and practice relating to the Personal Web. Research on the Personal Web is an outgrowth of the Smart Internet initiative, which seeks to extend and transform the web to be centred on the user, with the web as a calm platform ubiquitously providing cognitive support to its user and his or her tasks. As with the preceding SITCON workshop (held at CASCON 2009), this symposium involved a multi-disciplinary effort that brought together researchers and practitioners in data integration; web services modelling and architecture; human-computer interaction; predictive analytics; cloud infrastructure; semantics and ontology; and industrial application domains such as health care and finance. The discussions during the symposium dealt with different aspects of the architecture and functionality needed to make the Personal Web a reality. After the symposium the authors reworked their presentations into draft chapters that were submitted for peer evaluation and review. Every chapter went through two rounds of reviewing by at least two independent expert reviewers, and accepted chapters were then revised and are presented in this book.

Applied Parallel and Scientific Computing

Applied Parallel and Scientific Computing
Author: Kristján Jónasson
Publisher: Springer Science & Business Media
Total Pages: 501
Release: 2012-02-04
Genre: Computers
ISBN: 3642281443

The two volume set LNCS 7133 and LNCS 7134 constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Applied Parallel and Scientific Computing, PARA 2010, held in Reykjavík, Iceland, in June 2010. These volumes contain three keynote lectures, 29 revised papers and 45 minisymposia presentations arranged on the following topics: cloud computing, HPC algorithms, HPC programming tools, HPC in meteorology, parallel numerical algorithms, parallel computing in physics, scientific computing tools, HPC software engineering, simulations of atomic scale systems, tools and environments for accelerator based computational biomedicine, GPU computing, high performance computing interval methods, real-time access and processing of large data sets, linear algebra algorithms and software for multicore and hybrid architectures in honor of Fred Gustavson on his 75th birthday, memory and multicore issues in scientific computing - theory and praxis, multicore algorithms and implementations for application problems, fast PDE solvers and a posteriori error estimates, and scalable tools for high performance computing.