• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 1
  • Tagged with
  • 7
  • 7
  • 7
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Modeling and analysis of security

Unknown Date (has links)
Cloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security standards for Cloud Computing and web services, we have surveyed Cloud standards focusing more on the standards for security, and we classified them by groups of interests. Cloud Computing leverages a number of technologies such as: Web 2.0, virtualization, and Service Oriented Architecture (SOA). SOA uses web services to facilitate the creation of SOA systems by adopting different technologies despite their differences in formats and protocols. Several committees such as W3C and OASIS are developing standards for web services; their standards are rather complex and verbose. We have expressed web services security standards as patterns to make it easy for designers and users to understand their key points. We have written two patterns for two web services standards; WS-Secure Conversation, and WS-Federation. This completed an earlier work we have done on web services standards. We showed relationships between web services security standards and used them to solve major Cloud security issues, such as, authorization and access control, trust, and identity management. Close to web services, we investigated Business Process Execution Language (BPEL), and we addressed security considerations in BPEL and how to enforce them. To see how Cloud vendors look at web services standards, we took Amazon Web Services (AWS) as a case-study. By reviewing AWS documentations, web services security standards are barely mentioned. We highlighted some areas where web services security standards could solve some AWS limitations, and improve AWS security process. Finally, we studied the security guidance of two major Cloud-developing organizations, CSA and NIST. Both missed the quality of attributes offered by web services security standards. We expanded their work and added benefits of adopting web services security standards in securing the Cloud. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2013.
2

Best friend influence over adolescent problem behaviors: the role of perceived friendship quality

Unknown Date (has links)
Close friends have been shown to influence adolescent problem behaviors, especially alcohol abuse (Urberg, Degirmencioglu, and Pilgrim, 1997). The degree of influence, however varies as a function of individual characteristics such as peer acceptance (Laursen, Hafen, Kerr, and Stattin, 2012) and age (Popp et al., 2008). The present study examines whether differences in influence extend to perceptions of friendship quality. Using a sample of 764 Swedish adolescents involved in stable samesex reciprocal best friend relationships that lasted at least one year, analyses used distinguishable dyad actor-partner interdependence model (APIM) analyses (Kenny, Kashy, & Cook, 2006) to track influence over two years of the friendship. More satisfied friends were more influential than less satisfied friends on intoxication frequency and truancy. The findings of this study indicate that influence accompanies perceptions of quality. Those with higher perceptions of quality exhibit more influence on friends who perceive relatively lower quality. / Includes bibliography. / Thesis (M.A.)--Florida Atlantic University, 2013.
3

Communication and interactivity in B2B relationships

Unknown Date (has links)
This research explores the impact of interactive communication on business-to business (B2B) relationships. In the past decade the internet and especially social media as a mode of communication has grown rapidly in both consumer and business markets. Drawing on marketing channels and communications literature this paper identifies the dimensions of interactive communication and develops a theoretical framework to examine their impact on satisfaction, commitment, and advocacy. Media synchronicity theory and the concept of the internet as an alternative to the real world are used to distinguish between digital and non-digital modes of communication. Relationship marketing is used to identify the dimensions of interactivity: rationality, social interaction, contact density, and reciprocal feedback. The framework developed is usedto explore the influence of face-to-face (F2F), digital, and traditional, impersonalcommunications on the dimensions of interactivity.Hypotheses linking the mode of communication: personal, digital, and impersonal with the dimensions of interactivity and relational outcomes are empirically examined with data from the commercial printing and graphic design industry. Confirmatory Factor Analysis is used to analyze the measurement and structural model. Personal, F2F communication has the greatest impact on social interaction, reciprocal feedback, and number of contacts. Digital communication has a weaker effect on these dimensions and impersonal communication has the weakest effect. Personal and Digital have equal impacts on rationality and rationality is the only dimension of interactivity positively associated with relationship satisfaction. Contact density has a negative impact on relationship satisfaction and this negative impact is greater with personal communication that it is with digital. The study shows that affective commitment leads to advocacy in a B2B channel, but trust and calculative commitment have no impact on advocacy. The findings of the study have implications for both managers and researchers regarding the mode and content of communications in B2B relationships. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2013.
4

QoS management of web services. / Web服務質量管理 / Quality of service management of web services / CUHK electronic theses & dissertations collection / Web fu wu zhi liang guan li

January 2011 (has links)
In this thesis, we first propose a distributed QoS evaluation framework for Web services, named WS-DREAM. Inspired by the recent success of Web 2.0, our evaluation framework employs the concept of user-collaboration. In our framework, users in different geographic locations collaborative with each other to evaluate the target Web services and share their observed Web service QoS information. Based on our Web service evaluation framework, several large-scale distributed evaluations are conducted on 5,825 real-world Web services and the detailed evaluation results are publicly released for future research. / The predicted Web service QoS values can be employed to build fault-tolerant service-oriented systems. In the area of service computing, the cost for developing multiple redundant components is greatly reduced, since the functionally equivalent Web services are provided by different organizations and are accessible via Internet. Hence, based on the predicted QoS values, we propose two methods for building fault tolerance Web services. Firstly, we propose an adaptive fault tolerance strategy for Web services. Then, we present an optimal fault tolerance strategy selection framework for Web services. / Web service evaluation is time and resource consuming. Moreover, in some scenarios, Web service evaluation may not be possible (e.g., the Web service invocation is charged, too many service candidate, etc.). Therefore, Web service QoS prediction approaches are becoming more and more attractive. In order to prediction the Web service QoS as accurate as possible, we propose three prediction methods. The first prediction method employs the information of neighborhoods for making missing value prediction. The second method engages matrix factorization techniques to enhance the prediction accuracy. The third method predicts the ranking of the target Web services instead of QoS values. / Web service is becoming a major technique for building loosely-coupled distributed systems. Service-oriented architecture (SOA) has been widely employed in e-business, e-government, automotive systems, multimedia services, process control, finance, and a lot of other domains. Quality-of-Service (QoS) is usually employed for describing the non-functional characteristics of Web services and employed as an important differentiating point of different Web services. With the prevalence of Web services on the Internet, Web service QoS management is becoming more and more important. / Zheng, Zibin. / Adviser: Michael R. Lyu. / Source: Dissertation Abstracts International, Volume: 73-04, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (leaves 184-198). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
5

LAMS : a framework for XML web service management

Mifsud, Trent, 1976- January 2004 (has links)
Abstract not available
6

Policy-driven framework for manageable and adaptive service-oriented processes

Erradi, Abdelkarim, Computer Science & Engineering, Faculty of Engineering, UNSW January 2008 (has links)
Dynamic selection and composition of autonomous and loosely-coupled Web services is increasingly used to automate business processes. The typical long-running characteristic of business processes imposes new management challenges such as dynamic adaptation of running process instances. However, current process orchestration engines provide limited flexibility to dynamically adapt to changing runtime conditions (e.g., presence of faults). Additionally, current process specification languages exhibit some limitations regarding modularity of crosscutting management concerns. In particular, monitoring and adaptation logic is often scattered across several process definitions and intertwined with the business logic. This leads to monolithic and complex processes that are hard to understand, reuse, maintain, and evolve. To address these limitations, we developed a policy-based change management framework, named Manageable and Adaptable Service Compositions (MASC), to declaratively express crosscutting monitoring and process adaptation concerns in a separate and modular way. MASC policies use a set of simple, but flexible and relatively powerful, constructs to declaratively specify policies that govern: (1) discovery and selection of services to be used, (2) monitoring to detect the need for adaptation, (3) reconfiguration and adaptation of the process to handle special cases (e.g., context-dependant behaviour) and recover from typical faults in service-based processes. The identified constructs are executed by a lightweight service-oriented management middleware named MASC middleware. The adaptation is transparent because it preserves the original functional behaviour of the business process and does not tangle the adaptation logic with that of the business process. Additionally, policies do not have to be necessarily defined when designing the process; they can also be introduced later during deployment or at runtime. We implemented a MASC proof-of-concept prototype and evaluated it on Stock Trading case study scenarios. We conducted extensive studies to demonstrate the feasibility of the proposed techniques and illustrate the benefits of our approach in providing adaptive composite services using the policy-based approach. Our performance and scalability studies indicate that MASC middleware is scalable and the introduced overhead are acceptable.
7

Policy-driven framework for manageable and adaptive service-oriented processes

Erradi, Abdelkarim, Computer Science & Engineering, Faculty of Engineering, UNSW January 2008 (has links)
Dynamic selection and composition of autonomous and loosely-coupled Web services is increasingly used to automate business processes. The typical long-running characteristic of business processes imposes new management challenges such as dynamic adaptation of running process instances. However, current process orchestration engines provide limited flexibility to dynamically adapt to changing runtime conditions (e.g., presence of faults). Additionally, current process specification languages exhibit some limitations regarding modularity of crosscutting management concerns. In particular, monitoring and adaptation logic is often scattered across several process definitions and intertwined with the business logic. This leads to monolithic and complex processes that are hard to understand, reuse, maintain, and evolve. To address these limitations, we developed a policy-based change management framework, named Manageable and Adaptable Service Compositions (MASC), to declaratively express crosscutting monitoring and process adaptation concerns in a separate and modular way. MASC policies use a set of simple, but flexible and relatively powerful, constructs to declaratively specify policies that govern: (1) discovery and selection of services to be used, (2) monitoring to detect the need for adaptation, (3) reconfiguration and adaptation of the process to handle special cases (e.g., context-dependant behaviour) and recover from typical faults in service-based processes. The identified constructs are executed by a lightweight service-oriented management middleware named MASC middleware. The adaptation is transparent because it preserves the original functional behaviour of the business process and does not tangle the adaptation logic with that of the business process. Additionally, policies do not have to be necessarily defined when designing the process; they can also be introduced later during deployment or at runtime. We implemented a MASC proof-of-concept prototype and evaluated it on Stock Trading case study scenarios. We conducted extensive studies to demonstrate the feasibility of the proposed techniques and illustrate the benefits of our approach in providing adaptive composite services using the policy-based approach. Our performance and scalability studies indicate that MASC middleware is scalable and the introduced overhead are acceptable.

Page generated in 0.1148 seconds