scholarly journals On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

2015 ◽  
Vol 2015 ◽  
pp. 1-19 ◽  
Author(s):  
Katarzyna Mazur ◽  
Bogdan Ksiezopolski ◽  
Adam Wierzbicki

Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML) and evaluated its performance in terms of mentioned factors.

2004 ◽  
Vol 9 (5) ◽  
pp. 740-744
Author(s):  
Meng Xiao-feng ◽  
Luo Dao-feng ◽  
Ou Jian-bo

2012 ◽  
Vol 433-440 ◽  
pp. 7042-7045
Author(s):  
Zhong Wen Gao ◽  
Ming Sheng Zhang

In light of the problem of the security of Peer-to-Peer networks, an access control method is proposed which is based on the trust relationship between the peers in this paper. Thus the peers of different trust values can get different access authorities.


2018 ◽  
Vol 7 (3) ◽  
pp. 1795
Author(s):  
Rini Mahajan ◽  
Manish Mahajan ◽  
Dheerendra Singh

Cloud computing has changed the perspective of information storage worldwide; still it has not fully matured. Security, privacy and access control of the stored data is the biggest concern in the IT industries and these are the major research areas in the field of cloud computing. Although many researchers have proposed variety of access control methods, still there is a scope of improvement. The main objective of this paper is to study the limitations of formerly proposed access control methods and to propose a better new access control method. It is the combination of Attribute based access control (ABAC), Hierarchical Role based access control (HRBAC) and Policy based authentica-tion. As a result we got a fine grained access control method. It also includes the feature of role delegation which is very important in pre-sent scenarios. Comparative analysis shows that proposed method combined many new features with existing access control methods to make the system sound.  


2019 ◽  
Vol 5 (4) ◽  
pp. 99-105 ◽  
Author(s):  
S. Erokhin ◽  
A. Petukhov ◽  
P. Pilyugin

The article considers the possibilities of security management of critical information infrastructures. Approaches to the construction of policies not focused on a fixed list of threats are proposed. It substantiates the possibility of building a security policy based on security events monitoring. A formal description of security events and formal model of protection mechanisms based on monitoring security events is proposed. The features of this approach for the protection of critical information infrastructures in order to improve the quality of protection are considered.


2020 ◽  
Vol 3 (3) ◽  
pp. 95-99
Author(s):  
E. H. ABU ◽  

The article explores individual approaches used to measure and evaluate the quality of financial state-ments: standardized assessment, accrual-based models (accrual quality), Beneise models (M-Score), in-dexes - the internal control method and the degree of accounting conservatism. The reason for the great dependence on the use of indirect measures (proxies for the quality of financial statements or stock prices) is that some of the qualities of financial statements are unobservable.


2017 ◽  
Vol 6 (04) ◽  
pp. 5347 ◽  
Author(s):  
Omar B. Ahmed* ◽  
Anas S. Dablool

Several methods of Deoxyribonucleic acid (DNA) extraction have been applied to extract bacterial DNA. The amount and the quality of the DNA obtained for each one of those methods are variable. The study aimed to evaluate bacterial DNA extraction using conventional boiling method followed by alcohol precipitation. DNA extraction from Gram negative bacilli was extracted and precipitated using boiling method with further precipitation by ethanol. The extraction procedure performed using the boiling method resulted in high DNA yields for both E. coli and K. pneumoniae bacteria in (199.7 and 285.7μg/ml, respectively) which was close to control method (229.3 and 440.3μg/ml). It was concluded that after alcohol precipitation boiling procedure was easy, cost-effective, and applicable for high-yield quality of DNA in Gram-negative bacteria.


2020 ◽  
pp. 097300522096468
Author(s):  
Rajesh Gupta ◽  
Piyush Kumar Sinha ◽  
Akash Sahu ◽  
Vandana Sood

Craft industry is as much the mainstay of the rural economy after agriculture. It provides occupation to a large section of population. However, it is characterised by fragmented individual artisans on one side and dispersed customers on the other. It also suffers from market separations. Urban haats were set up with the objective to present artisans and buyer on one platform and reduce these separations. In this study urban haats have been conceptualised as marketplaces that bring artisans and customers at one place to optimise their respective values. They also serve as a tool for disintermediation and a social distribution initiative and represent a retailing initiative in the inclusive entrepreneurship domain. This study focusses on identifying drivers of success of urban haats. Using a mixed method approach, data was collected from Haat officials and NGO members through personal interviews. The data from artisans and customers was collected through a survey using a structured response format. The study was conducted at 18 haats in 10 states. The study highlights the factors that drive satisfaction of artisans and customers and the role of administrators in making the marketplace a success. Customer consider diversity of the products, quality of the products, behaviour of the salesperson, price parity with other markets, buying experience, parking space and aesthetics of the stalls as major influencing factors for the recommendation of the haats to other customers. Most important attributes of the haats in driving artisan satisfaction were stall allotment system, haat location, advertisements, product promotion and monitoring. It is also found that while the infrastructure is necessary, it is not sufficient in enhancing the performance and sustainability of haats. Administration of these haats plays a defining mediating role. Based on these findings, an approach is proposed for success of urban haats.


Work ◽  
2021 ◽  
pp. 1-12
Author(s):  
Zhang Mengqi ◽  
Wang Xi ◽  
V.E. Sathishkumar ◽  
V. Sivakumar

BACKGROUND: Nowadays, the growth of smart cities is enhanced gradually, which collects a lot of information and communication technologies that are used to maximize the quality of services. Even though the intelligent city concept provides a lot of valuable services, security management is still one of the major issues due to shared threats and activities. For overcoming the above problems, smart cities’ security factors should be analyzed continuously to eliminate the unwanted activities that used to enhance the quality of the services. OBJECTIVES: To address the discussed problem, active machine learning techniques are used to predict the quality of services in the smart city manages security-related issues. In this work, a deep reinforcement learning concept is used to learn the features of smart cities; the learning concept understands the entire activities of the smart city. During this energetic city, information is gathered with the help of security robots called cobalt robots. The smart cities related to new incoming features are examined through the use of a modular neural network. RESULTS: The system successfully predicts the unwanted activity in intelligent cities by dividing the collected data into a smaller subset, which reduces the complexity and improves the overall security management process. The efficiency of the system is evaluated using experimental analysis. CONCLUSION: This exploratory study is conducted on the 200 obstacles are placed in the smart city, and the introduced DRL with MDNN approach attains maximum results on security maintains.


Sign in / Sign up

Export Citation Format

Share Document