Angebote zu "Resource" (20 Treffer)

Kategorien

Shops

Fine-Grained Authorization Services in Virtual ...
59,00 € *
ggf. zzgl. Versand

Revision with unchanged content. The last few years have experienced a steady growth in research institutions interest in developing research projects that involve more than one insti tution s computing resources - forming virtual organizations. The goal of any virtual organization is to provide member institutions with an interoperable, easy to use and secure research environment. Shibboleth was one of the pre mier choices of infrastructure to be used to create collaborative inter-institu tional research environments as it provides a coherent architecture to securely share computing resources across multiple institutions without the need for individualized user credentials for each shared resource. Some of the prob lems that Shibboleth encountered in practice deal with its distributed authentication and authorization mechanisms and its user data accessability design. This work addresses these issues and provides a solution that allows for fine-grained authorization services in any virtual organization. We pro pose an extension to the Shibboleth design by separating the definition, management, and usage of the user s virtual organization entitlements from the identity provider. This book is addressed to professionals in Informa tionTechnology, researchers and students in Distributed Systems, Networking and Security.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
HIV Partner Services in limited resource settin...
28,90 € *
ggf. zzgl. Versand

Most healthcare settings especially in developing countries advise HIV clients to self notify their partners of their statuses or encourage them to bring their partners to providers regardless of possible negative consequences. This practice leads to minimal disclosure rates contributing to the high HIV prevalence rates. This book provides more insight on how healthcare providers can step in and assist HIV positive persons better notify their partners about their exposure while limiting negative outcomes such as partner violence. Provider referral is the most effective method in HIV partner notification therefore should be among the options offered to HIV clients during counseling to increase partner disclosure as part of a solution to limit HIV transmission. There is however need for more training and funding in order for such a program to be successfully implemented in limited resource settings.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Placement of SaaS Components in Cloud Computing...
39,90 € *
ggf. zzgl. Versand

The SaaS deployment is the installation to delivery of software services in cloud computing infrastructure. SaaS deployment is initiated by a cloud service provider via a user requesting process, which is generally automated. SaaS is a combination of different type of components, application component, integration component, business component, and storage component. Component placement problem (CPP) concerns with finding the optimum set of VMs on which SaaS components can be placed such that all user requirements should be satisfied and maximizes the profit of the SaaS providers. In CPP, the solution of the problem is subject to a set of resource and SLA constraints. The CPP is presented as a linear programming problem. The CPP has been proven by researchers as an NP-complete, hence the Genetic Algorithm approach has been used to produce sub optimal solution

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Evidence-Based Medical Ethics:
96,29 € *
ggf. zzgl. Versand

In the modern practice of medicine, new challenges complicate the ethical care of patients. Today's times require a contemporary take on the concept of medical ethics. The idea for this textbook was born out of a need for a teaching resource that merges medical ethics theory with the practical needs of modern clinical medicine. In Evidence-Based Medical Ethics: Cases for Practice-Based Learning , the authors address what has been missing in existing text books and ethics courses to date - clear-cut ethical and legal guidelines that provide a method for the reader to learn how to systematically manage dilemmas seen in the everyday practice of medicine. The reader is guided through several "typical" patient scenarios and prompted by various questions that should be entertained by the treating health care provider. Then, relevant evidence-based medicine, legal precedent, and the ethical theory that applies to the situation are revealed. Often, finding the "best" ethical solution for each problem is automatic, as the solution often becomes self-evident during information-gathering. This general method is reinforced throughout the text with multiple different cases, using a practice-based approach by building on the reader's developing skills. Additionally, we have sought to emphasize a culturally competent manner in resolving these dilemmas, respectfully addressing issues of age, gender, and culture whenever possible. The main goal of Evidence-Based Medical Ethics: Cases for Practice-Bases Learning is to assist the reader in adapting a patient-centered and evidence-based approach to dilemmas faced in their future practice of medicine.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Intel Trusted Execution Technology for Server P...
37,44 € *
ggf. zzgl. Versand

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.”   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk.”   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Second Life Grid
71,90 CHF *
ggf. zzgl. Versand

Corporations, non-profits, and educational institutions will welcome this official guide that shows how to establish and maintain a successful virtual presence in 'Second Life.' Written with the full support of Linden Lab, this is the perfect resource for organizations entering 'Second Life.' Topics discussed include the technical and social issues of participating in 'Second Life,' including integrating corporate culture into 'Second Life,' in-world marketing techniques, selecting a solution provider, and how to conduct real-world business in 'Second Life.' Plus, you'll get hands-on solutions, smart tactics, and practical techniques, such as setting up useful meeting spaces and planning and moderating events. The book is filled with actual case studies of how top organizations have leveraged 'Second Life' and offers analysis of their SL presence.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
HIV Partner Services in limited resource settin...
48,90 CHF *
ggf. zzgl. Versand

Most healthcare settings especially in developing countries advise HIV clients to self notify their partners of their statuses or encourage them to bring their partners to providers regardless of possible negative consequences. This practice leads to minimal disclosure rates contributing to the high HIV prevalence rates. This book provides more insight on how healthcare providers can step in and assist HIV positive persons better notify their partners about their exposure while limiting negative outcomes such as partner violence. Provider referral is the most effective method in HIV partner notification therefore should be among the options offered to HIV clients during counseling to increase partner disclosure as part of a solution to limit HIV transmission. There is however need for more training and funding in order for such a program to be successfully implemented in limited resource settings.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Fine-Grained Authorization Services in Virtual ...
96,90 CHF *
ggf. zzgl. Versand

Revision with unchanged content. The last few years have experienced a steady growth in research institutions' interest in developing research projects that involve more than one insti tution's computing resources - forming virtual organizations. The goal of any virtual organization is to provide member institutions with an interoperable, easy to use and secure research environment. Shibboleth was one of the pre mier choices of infrastructure to be used to create collaborative inter-institu tional research environments as it provides a coherent architecture to securely share computing resources across multiple institutions without the need for individualized user credentials for each shared resource. Some of the prob lems that Shibboleth encountered in practice deal with its distributed authentication and authorization mechanisms and its user data accessability design. This work addresses these issues and provides a solution that allows for fine-grained authorization services in any virtual organization. We pro pose an extension to the Shibboleth design by separating the definition, management, and usage of the user's virtual organization entitlements from the identity provider. This book is addressed to professionals in Informa tionTechnology, researchers and students in Distributed Systems, Networking and Security.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
127,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot