application service providers
Recently Published Documents


TOTAL DOCUMENTS

120
(FIVE YEARS 5)

H-INDEX

15
(FIVE YEARS 0)

2021 ◽  
Vol 9 ◽  
Author(s):  
Zhe Sun ◽  
Junping Wan ◽  
Bin Wang ◽  
Zhiqiang Cao ◽  
Ran Li ◽  
...  

Data-driven deep learning has accelerated the spread of social computing applications. To develop a reliable social application, service providers need massive data on human behavior and interactions. As the data is highly relevant to users’ privacy, researchers have conducted extensive research on how to securely build a collaborative training model. Cryptography methods are an essential component of collaborative training which is used to protect privacy information in gradients. However, the encrypted gradient is semantically invisible, so it is difficult to detect malicious participants forwarding other’s gradient to profit unfairly. In this paper, we propose a data ownership verification mechanism based on Σ-protocol and Pedersen commitment, which can help prevent gradient stealing behavior. We deploy the Paillier algorithm on the encoded gradient to protect privacy information in collaborative training. In addition, we design a united commitment scheme to complete the verification process of commitments in batches, and reduce verification consumption for aggregators in large-scale social computing. The evaluation of the experiments demonstrates the effectiveness and efficiency of our proposed mechanism.


Author(s):  
I Kadek Dendy Senapartha

Single Sign-On (SSO) is a technology that can support user convenience in accessing a system. By using SSO, a user only needs to authenticate once to get access to a system. OAuth 2.0 is one of the protocols that can be implemented on the SSO system. Currently, many Application Service Providers (ASP) support the OAuth 2.0 protocol thus providing convenience in the development of a more standard SSO system. Google Identity is one of the services provided by Google that can be used to build SSO systems using the OAuth 2.0 protocol. Application of the request and response methods provided by the protocol specification OAuth 2.0 and Representational State Transfer (REST) architecture of the system implementation can also make SSO systems more secure. In its implementation, the use of an agile system development methodology with the Scrum framework is used to increase speed and flexibility. The results of this research show that the use of Google Identity, REST, and OAuth 2.0 can provide easy user access, guarantee access validity, accelerate client-server data exchange and simplify the SSO implementation process.


Author(s):  
V.S. Ch Lakshmi Narayana ◽  
Sharayu Moharir ◽  
Nikhil Karamchandani

The rapid proliferation of shared edge computing platforms has enabled application service providers to deploy a wide variety of services with stringent latency and high bandwidth requirements. A key advantage of these platforms is that they provide pay-as-you-go flexibility by charging clients in proportion to their resource usage through short-term contracts. This affords the client significant cost-saving opportunities by dynamically deciding when to host its service on the platform, depending on the changing intensity of requests. A natural policy for our setting is the Time-To-Live (TTL) policy. We show that TTL performs poorly both in the adversarial arrival setting, i.e., in terms of the competitive ratio, and for i.i.d. stochastic arrivals with low arrival rates, irrespective of the value of the TTL timer. We propose an online policy called RetroRenting (RR) and characterize its performance in terms of the competitive ratio. Our results show that RR overcomes the limitations of TTL. In addition, we provide performance guarantees for RR for i.i.d. stochastic arrival processes coupled with negatively associated rent cost sequences and prove that it compares well with the optimal online policy. Further, we conduct simulations using both synthetic and real-world traces to compare the performance of RR with the optimal offline and online policies. The simulations show that the performance of RR is near optimal for all settings considered. Our results illustrate the universality of RR.


2021 ◽  
Author(s):  
Praneeth Sakhamuri

Deploying and managing high availability-tiered application in the cloud is challenging, as it requires providing necessary virtual machines to make the application available. An application is available if it works and responds in a timely manner for varying workloads. Application service providers need to allocate specified number of working virtual machine copies for each server with at least a given minimum computing power, to meet the response time requirement. Otherwise, we may end up with response time failures. This thesis formulates an optimization problem that determines the number and type of virtual machines needed for each server to minimize the cost and at the same time guarantees the availability SLA (Service-Level Agreement) for different workloads. The results demonstrate that a diverse approach is more cost-effective than running on a single type of virtual machine, and buying only the cheapest virtual machines for an application is not always economical.


2021 ◽  
Author(s):  
Praneeth Sakhamuri

Deploying and managing high availability-tiered application in the cloud is challenging, as it requires providing necessary virtual machines to make the application available. An application is available if it works and responds in a timely manner for varying workloads. Application service providers need to allocate specified number of working virtual machine copies for each server with at least a given minimum computing power, to meet the response time requirement. Otherwise, we may end up with response time failures. This thesis formulates an optimization problem that determines the number and type of virtual machines needed for each server to minimize the cost and at the same time guarantees the availability SLA (Service-Level Agreement) for different workloads. The results demonstrate that a diverse approach is more cost-effective than running on a single type of virtual machine, and buying only the cheapest virtual machines for an application is not always economical.


Author(s):  
Ye-Sho Chen ◽  
Chuanlan Liu ◽  
Qingfeng Zeng ◽  
Renato F. L. Azevedo

Franchising as a global growth strategy, especially in emerging markets, is gaining its popularity. For example, the U.S. Commercial Service estimated that China, having over 2,600 brands with 200,000 franchised retail stores in over 80 sectors, is now the largest franchise market in the world. The popularity of franchising continues to increase, as we witness an emergence of a new e-business model, Netchising, which is the combination power of the Internet for global demand-and-supply processes and the international franchising arrangement for local responsiveness. The essence of franchising lies in managing the good relationship between the franchisor and the franchisee. In this paper, we showed how e-business and analytics strategy plays an important role in growing and nurturing such a good relationship. Specifically, we discussed: managing the franchisor/franchisee relationship, harnessing the e-business strategy with aligning the e-business strategy with application service providers, an attention-based framework for franchisee training and how big data and business analytics can be used to implement the attention-based framework.


2018 ◽  
pp. 1864-1892
Author(s):  
Artur Miguel Arsenio

One of the main concerns for current multimedia platforms is the provisioning of content that provides a good Quality of Experience to end-users. This can be achieved through new interactive, personalized content applications, as well by improving the image quality delivered to the end-user. This chapter addresses these issues by describing mechanisms for changing content consumption. The aim is to give Application Service Providers (ASPs) new ways to allow users to configure contents according to their personal tastes while also improving their Quality of Experience, and to possibly charge users for such functionalities. The authors propose to employ computer vision techniques to produce extra object information, which further expands the range of video personalization possibilities on the presence of new video coding mechanisms1.


2018 ◽  
Vol 10 (1) ◽  
pp. 1-17
Author(s):  
Chia-Ping Yu ◽  
Chih-Ping Chu ◽  
Pin-Hui Lu

This article uses qualitative research and grounded theories, to explore information security issues in the development of information systems. Its findings are: first, three security issues are identified: security plans, resources, and a security policy to implement information security mechanisms. Second, there are strong connections between security plans, resources and security policy. Third, managers implement several critical security issues across stages of system development life cycle. This article identifies the opportunities and challenges facing security management issues. Clear security policies or plans can guide software practitioners in an organization to focus on security issues, and keep controlling threats thereafter. In order to improve the quality of security management and to identify possible threats over a longer term, organizations have to monitor and manage their application service providers and security techniques.


Author(s):  
Ye-Sho Chen ◽  
Chuanlan Liu ◽  
Qingfeng Zeng ◽  
Renato F. L. Azevedo

Franchising as a global growth strategy, especially in emerging markets, is gaining its popularity. For example, the U.S. Commercial Service estimated that China, having over 2,600 brands with 200,000 franchised retail stores in over 80 sectors, is now the largest franchise market in the world. The popularity of franchising continues to increase, as we witness an emergence of a new e-business model, Netchising, which is the combination power of the Internet for global demand-and-supply processes and the international franchising arrangement for local responsiveness. The essence of franchising lies in managing the good relationship between the franchisor and the franchisee. In this paper, we showed how e-business and analytics strategy plays an important role in growing and nurturing such a good relationship. Specifically, we discussed: managing the franchisor/franchisee relationship, harnessing the e-business strategy with aligning the e-business strategy with application service providers, an attention-based framework for franchisee training and how big data and business analytics can be used to implement the attention-based framework.


Sign in / Sign up

Export Citation Format

Share Document