Search
Now showing items 81-90 of 223
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
(
Springer Verlag
, 2014 , Conference Paper)
Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ...
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
Cooperative education development: Towards ICT reference models
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The paper focuses on the modeling of new Information and Communication Technology competences and skills. Competencies as abstractions of work human behavior, have emerged as a promising concept to make human skills and ...
Higher education internationalization: The Erasmus-Mundus network added value
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Higher education internationalization can play a major role in developing universities and students' capacities and their opportunities broadly throughout the world. Irrespective of contextual differences within and between ...
Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World: IFIP WG 5.7 International Conference, APMS 2014, Ajaccio, France, September 20-24, 2014, Proceedings, Part II
(
Springer New York LLC
, 2014 , Conference Paper)
The three volumes IFIP AICT 438, 439, and 440 constitute the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2014, held in Ajaccio, France, in September ...
Advances in Production Management Systems: Innovative and Knowledge-Based Production Management in a Global-Local World: IFIP WG 5.7 International Conference, APMS 2014, Ajaccio, France, September 20-24, 2014, Proceedings, Part I
(
Springer New York LLC
, 2014 , Conference Paper)
The three volumes IFIP AICT 438, 439, and 440 constitute the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2014, held in Ajaccio, France, in September ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
An LP model for optimizing a supply chain management system for steel company
(
Newswood Limited
, 2014 , Conference Paper)
In this research, we have developed a linear programming formulation to describe Qatar steel manufacturing supply chain from suppliers to consumers. The purpose of the model is to provide answers regarding the optimal ...
Maximum throughput of a cooperative energy harvesting cognitive radio user
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain ...