Investigation of Security Issues in Distributed System Monitoring

Author(s):  
Manjunath Kotari ◽  
Niranjan N. Chiplunkar
2013 ◽  
Vol 73 (3) ◽  
pp. 330-340 ◽  
Author(s):  
Gang Wu ◽  
Huxing Zhang ◽  
Meikang Qiu ◽  
Zhong Ming ◽  
Jiayin Li ◽  
...  

2013 ◽  
Vol 2013 ◽  
pp. 1-31 ◽  
Author(s):  
Nattakarn Phaphoom ◽  
Xiaofeng Wang ◽  
Pekka Abrahamsson

The cloud computing paradigm has brought the benefits of utility computing to a global scale. It has gained paramount attention in recent years. Companies are seriously considering to adopt this new paradigm and expecting to receive significant benefits. In fact, the concept of cloud computing is not a revolution in terms of technology; it has been established based on the solid ground of virtualization, distributed system, and web services. To comprehend cloud computing, its foundations and technological landscape need to be adequately understood. This paper provides a comprehensive review on the building blocks of cloud computing and relevant technological aspects. It focuses on four key areas including architecture, virtualization, data management, and security issues.


Author(s):  
Manish Manoria ◽  
Ajit Kumar Shrivastava ◽  
Satyendra Singh Thakur ◽  
Debu Sinha

Information (biometric) security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms, biometric information is very sophisticated in terms of all, in this work we are focusing on data pattern along with all security assurance, so that we can improve the matching performance with good security assurance, here one of the most effective RSA algorithm use with biometric (fingerprint) data. Our work includes the determination of appropriate key sizes with security issues and determines the matching performance using MATLAB and JDK1.6, performance of this system is more than 86.7% and when combines this with blind authentication techniques then we get all security assurance with high performance biometric cryptosystem.


Author(s):  
Yu Jiao ◽  
Ali R. Hurson ◽  
Thomas E. Potok

The rapid expansion of information and the high demand for timely data delivery have triggered the development of a large number of wireless information systems that enable users to access data from anywhere at anytime. These applications must face three major challenges: the limited bandwidth of wireless medium, intermittent network connectivity, and the fact that portable devices have limited CPU power, memory, and energy sources. Traditional distributed system design methods, such as the client/server-based computational model, cannot meet the aforementioned challenges very well. In contrast, a relatively new distributed system design paradigm, the mobile agent-based computation model, provides natural solutions to these problems. In this article, we will introduce the concept of mobile agent-based computing, review some examples of existing agent-based information systems, and discuss security issues that are related to them.


2014 ◽  
Vol 100 (8) ◽  
pp. 1-5
Author(s):  
Akshada TBhondave ◽  
Santoshkumar Biradar

Sign in / Sign up

Export Citation Format

Share Document