• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Admission control and dynamic adaptation for a proportional-delay DiffServ-enabled Web server.

January 2003 (has links)
Lee Cheuk Man. / Thesis submitted on: November 2002. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 56-57). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Background & Problem Formulation --- p.4 / Chapter 3 --- Admission Control and Resource Provisioning --- p.12 / Chapter 3.1 --- Admission Control & Class Assignment --- p.12 / Chapter 3.2 --- Maximum Profit Algorithm (MPA) --- p.12 / Chapter 3.3 --- Maximum Admission Algorithm (MAA) --- p.18 / Chapter 4 --- Dynamic Class Adaptation --- p.25 / Chapter 4.1 --- Centralized Approach: Server-Based Dynamic Adaptation (SBDA) --- p.26 / Chapter 4.2 --- Distributed & Game-Theoretic Approach: Client-Based Dy- namic Adaptation (CBDA) --- p.30 / Chapter 5 --- Performance Evaluation --- p.34 / Chapter 5.1 --- Experiment 1: Comparison of MPA and MAA Admission Control --- p.34 / Chapter 5.1.1 --- Experiment 1.A --- p.35 / Chapter 5.1.2 --- Experiment 1.B --- p.36 / Chapter 5.1.3 --- Experiment 1.C --- p.37 / Chapter 5.1.4 --- Experiment 1.D --- p.38 / Chapter 5.1.5 --- Experiment 1.E --- p.40 / Chapter 5.2 --- Experiment 2: Necessity for Adaptation --- p.41 / Chapter 5.3 --- Experiment 3: Comparison of SBDA and CBDA Adaptation Algorithms --- p.43 / Chapter 5.3.1 --- Experiment 3.A --- p.43 / Chapter 5.3.2 --- Experiment 3.B --- p.47 / Chapter 5.3.3 --- Experiment 3.C --- p.52 / Chapter 6 --- Related Work --- p.54 / Bibliography --- p.56
2

A pattern-driven process for secure service-oriented applications

Unknown Date (has links)
During the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies the MDA approach to the design of service-oriented applications but also because it allows their securing by dynamically applying security patterns throughout the whole process. Security patterns capture security knowledge and describe security mechanisms. In our process, we present a structured map of security patterns for SOA and web services and its corresponding catalog. At the different steps of a software lifecycle, the architect or designer needs to make some security decisions. / An approach using a decision tree made of security pattern nodes is proposed to help making these choices. We show how to extract a decision tree from our map of security patterns. Model-Driven Architecture (MDA) is an approach which promotes the systematic use of models during a system's development lifecycle. In the dissertation we describe a chain of transformations necessary to obtain secure models of the service-oriented application. A main benefit of this process is that it decouples the application domain expertise from the security expertise that are both needed to build a secure application. Security knowledge is captured by pre-defined security patterns, their selection is rendered easier by using the decision trees and their application can be automated. A consequence is that the inclusion of security during the software development process becomes more convenient for the architects/designers. / A second benefit is that the insertion of security is semi-automated and traceable. Thus, the process is flexible and can easily adapt to changing requirements. Given that SOA was developed in order to provide enterprises with modular, reusable and adaptable architectures, but that security was the principal factor that hindered its use, we believe that our process can act as an enabler for service-oriented applications. / by Nelly A. Delessy. / Thesis (Ph.D.)--Florida Atlantic University, 2008. / Includes bibliography. / Electronic reproduction. Boca Raton, FL : 2008 Mode of access: World Wide Web.
3

Progress towards push button verification for business process execution language artifacts

Unknown Date (has links)
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed. / by Augusto Varas. / Thesis (M.S.C.S.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
4

Patterns for web services standards

Unknown Date (has links)
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy. / by Ola Ajaj. / Thesis (M.S.C.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.

Page generated in 0.1016 seconds