Current Search: Computational grids Computer systems (x)
View All Items
- Title
- Modeling and analysis of security.
- Creator
- Ajaj, Ola, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Cloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security...
Show moreCloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security standards for Cloud Computing and web services, we have surveyed Cloud standards focusing more on the standards for security, and we classified them by groups of interests. Cloud Computing leverages a number of technologies such as: Web 2.0, virtualization, and Service Oriented Architecture (SOA). SOA uses web services to facilitate the creation of SOA systems by adopting different technologies despite their differences in formats and protocols. Several committees such as W3C and OASIS are developing standards for web services; their standards are rather complex and verbose. We have expressed web services security standards as patterns to make it easy for designers and users to understand their key points. We have written two patterns for two web services standards; WS-Secure Conversation, and WS-Federation. This completed an earlier work we have done on web services standards. We showed relationships between web services security standards and used them to solve major Cloud security issues, such as, authorization and access control, trust, and identity management. Close to web services, we investigated Business Process Execution Language (BPEL), and we addressed security considerations in BPEL and how to enforce them. To see how Cloud vendors look at web services standards, we took Amazon Web Services (AWS) as a case-study. By reviewing AWS documentations, web services security standards are barely mentioned. We highlighted some areas where web services security standards could solve some AWS limitations, and improve AWS security process. Finally, we studied the security guidance of two major Cloud-developing organizations, CSA and NIST. Both missed the quality of attributes offered by web services security standards. We expanded their work and added benefits of adopting web services security standards in securing the Cloud.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004001
- Subject Headings
- Cloud Computing, Computational grids (Computer systems), Computer network architectures, Expert systems (Computer science), Web services -- Management
- Format
- Document (PDF)
- Title
- Enabling access for mobile devices to the web services resource framework.
- Creator
- Mangs, Jan Christian., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The increasing availability of Web services and grid computing has made easier the access and reuse of different types of services. Web services provide network accessible interfaces to application functionality in a platform-independent manner. Developments in grid computing have led to the efficient distribution of computing resources and power through the use of stateful web services. At the same time, mobile devices as a platform of computing have become a ubiquitous, inexpensive, and...
Show moreThe increasing availability of Web services and grid computing has made easier the access and reuse of different types of services. Web services provide network accessible interfaces to application functionality in a platform-independent manner. Developments in grid computing have led to the efficient distribution of computing resources and power through the use of stateful web services. At the same time, mobile devices as a platform of computing have become a ubiquitous, inexpensive, and powerful computing resource. Concepts such as cloud computing has pushed the trend towards using grid concepts in the internet domain and are ideally suited for internet-supported mobile devices. Currently, there are a few complete implementations that leverage mobile devices as a member of a grid or virtual organization. This thesis presents a framework that enables the use of mobile devices to access stateful Web services on a Globus-based grid. To illustrate the presented framework, a user-friendly mobile application has been created that utilizes the framework libraries do to demonstrate the various functionalities that are accessible from any mobile device that supports Java ME.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/186290
- Subject Headings
- User interfaces (Computer systems), Data structures (Computer science), Mobile computing, Security measures, Mobile communication systems, Computational grids (Computer systems)
- Format
- Document (PDF)
- Title
- XYZ: A scalable, partially centralized lookup service for large-scale peer-to-peer systems.
- Creator
- Zhang, Jianying., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Peer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. The objective of this thesis was to design XYZ, a partially centralized, scalable and self-organizing lookup service for wide area P2P systems. The XYZ system is based on distributed hash table (DHT). A unique ID and a color assigned to each...
Show morePeer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. The objective of this thesis was to design XYZ, a partially centralized, scalable and self-organizing lookup service for wide area P2P systems. The XYZ system is based on distributed hash table (DHT). A unique ID and a color assigned to each node and each file. The author uses clustering method to create the system backbone by connecting the cluster heads together and uses color clustering method to create color overlays. Any lookup for a file with a color will only be forwarded in the color overlay with the same color so that the searching space is minimized. Simulations and analysis are also provided in this thesis.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13263
- Subject Headings
- Wireless communication systems, Peer-to-peer architecture (Computer networks), Computational grids (Computer systems)
- Format
- Document (PDF)
- Title
- Patterns for web services standards.
- Creator
- Ajaj, Ola, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to...
Show moreWeb services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927300
- Subject Headings
- Computational grids (Computer systems), Computer systems, Verification, Expert systems (Computer science), Computer network architectures, Web servers, Management, Electronic commerce, Computer programs
- Format
- Document (PDF)
- Title
- Finite element modeling of dislocation multiplication in microelectronic and optoelectronic devices/circuits.
- Creator
- Wang, Xueming., Florida Atlantic University, Tsai, Chi-Tay, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Two-dimensional and three-dimensional methodologies are developed to determine the dislocation multiplication in microelectronic and optoelectronic devices/circuits. A two-dimensional finite element code is developed to simulate the dislocation multiplication in microelectronic and optoelectronic devices/circuits. Example two-dimensional analyses are performed and analysis results are presented. The three-dimensional methodology is successfully implemented using ANSYS APDL Language within the...
Show moreTwo-dimensional and three-dimensional methodologies are developed to determine the dislocation multiplication in microelectronic and optoelectronic devices/circuits. A two-dimensional finite element code is developed to simulate the dislocation multiplication in microelectronic and optoelectronic devices/circuits. Example two-dimensional analyses are performed and analysis results are presented. The three-dimensional methodology is successfully implemented using ANSYS APDL Language within the ANSYS program. A three dimensional heterojunction bipolar transistor model is generated. CFD-thermal and structural analyses are performed to determine temperature fields and dislocation densities, which are calculated as functions of time, thickness of the thermal shunt, and heat generation rates.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12182
- Subject Headings
- Finite element method, Computational grids, ANSYS (Computer systems), Semiconductors--Materials--Analysis
- Format
- Document (PDF)
- Title
- An Android approach to web services resource framework.
- Creator
- Garcia-Kunzel, Adriana., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services have become increasingly important over the past decades. Versatility and platform independence are just some of their advantages. On the other hand, grid computing enables the efficient distribution of computing resources. Together, they provide a great source of computing power that can be particularly leveraged by mobile devices. Mobile computing enables information creation, processing, storage and communication without location constraints [63], not only improving business'...
Show moreWeb services have become increasingly important over the past decades. Versatility and platform independence are just some of their advantages. On the other hand, grid computing enables the efficient distribution of computing resources. Together, they provide a great source of computing power that can be particularly leveraged by mobile devices. Mobile computing enables information creation, processing, storage and communication without location constraints [63], not only improving business' operational efficiency [63] but actually changing a way of life. However, the convenience of anytime and anywhere communication is counterbalanced by small screens, limited computing power and battery life. Despite these limitations, mobile devices can extend grid functionality by bringing to the mix not only mobile access but sensing capabilities as well, gathering information from their surroundings through built in mechanisms, such as microphone, camera, GPS and even accelerometers. Prior work has already demonstrated the possibility of enabling Web Services Resource Framework (WSRF) access to grid resources from mobile device clients in the WSRF-ME project [39], where a representative Nokia S60 Smartphone application was created on a framework, which extends the JSR-172 functionality to achieve WSRF compliance. In light of today's mobile phone market diversity, this thesis extends the solution proposed by WSRF-ME to non-Java ME phones and to Android devices in particular. Android-based device numbers have grown considerably over the past couple of years despite its recent creation and reduced availability of mature software tools., Therefore, Android's web service capabilities are studied and the original framework is analyzed in order to propose a modified framework version that achieves and documents WSRF compliant communication form Android for the first time. As a case study, an illustrative mobile File Explorer application is developed to match the mod framework' functionality to the original WSRF-ME's use case. An additional case study, the LIGO Monitor application, shows the viability of mobile web services for monitoring purposes in the Laser Interferometer Gravitational Observatory (LIGO) grid environment for the first time. The context that an actual application implementation such as LIGO provides, allows some of the challenges of real mobile grid clients to surface. As a result, the observations made during this development give way to the drafting of a preliminary set of guidelines for Globus service implementation suitable for Android consumption that still remain open for proof in future works.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2684891
- Subject Headings
- Application software, Development, Mobile communication systems, User interfaces (Computer systems), Computational grids (Computer systems), Data structures (Computer science)
- Format
- Document (PDF)