A Stackelberg game model for resource allocation in cargo container security [PDF]
Cataloged from PDF version of article.This paper presents a game theoretic model that analyzes resource allocation strategies against an adaptive adversary to secure cargo container transportation.
Bakir, N. O.
core +1 more source
Two ways to Grid: the contribution of Open Grid Services Architecture (OGSA) mechanisms to service-centric and resource-centric lifecycles [PDF]
Service Oriented Architectures (SOAs) support service lifecycle tasks, including Development, Deployment, Discovery and Use. We observe that there are two disparate ways to use Grid SOAs such as the Open Grid Services Architecture (OGSA) as exemplified ...
Brebner, P., Emmerich, W.
core +1 more source
Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou +7 more
core +4 more sources
RMD-QOSM: The NSIS Quality-of-Service Model for Resource Management in Diffserv [PDF]
This document describes a Next Steps in Signaling (NSIS) Quality-of- Service (QoS) Model for networks that use the Resource Management in Diffserv (RMD) concept.
Bader, A. +4 more
core +3 more sources
Container Security: Issues, Challenges, and the Road Ahead
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better microservice architecture support. The value of the container market is expected to reach $2.7 billion in 2020 as compared to $762 million in 2016.
Sari Sultan +2 more
doaj +1 more source
KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
Kubernetes, which is the most popular orchestration platform for Docker containers, is used widely for developing microservices and automating Docker instance life cycle administration.
Chin‐Wei Tien +4 more
doaj +1 more source
N-variant Architecture for Container Runtime Security Threats [PDF]
It is container technology that has promoted the development of cloud computing with its lightweight and scalability advantages,but the security threat of container runtime is increasingly serious.The existing intrusion detection and access control ...
LIU Daoqing, HU Hongchao, HUO Shumin
doaj +1 more source
Container-based network function virtualization for software-defined networks [PDF]
Today's enterprise networks almost ubiquitously deploy middlebox services to improve in-network security and performance. Although virtualization of middleboxes attracts a significant attention, studies show that such implementations are still ...
Cziva, Richard +3 more
core +1 more source
Electronic cargo seal for safe and secure supply chain traceability [PDF]
Recently, the United Statesgovernment plans to introduce electronic container seals on all imported containers as a mandatory requirement. Further, containers without electronic seals may be prohibited or restricted for import based on this planned ...
Jung Ung Min, Minyoung Park
doaj +1 more source
Design and Implementation of 3-D Measurement Method for Container Handling Target
In the process of automatic container terminal loading and unloading, the three-dimensional attitude of the container affects the security of loading and unloading operations, so the three-dimensional attitude positioning of the container is very ...
Chao Mi +4 more
doaj +1 more source

