Results 11 to 20 of about 199,972 (293)

A Stackelberg game model for resource allocation in cargo container security [PDF]

open access: yes, 2010
Cataloged from PDF version of article.This paper presents a game theoretic model that analyzes resource allocation strategies against an adaptive adversary to secure cargo container transportation.
Bakir, N. O.
core   +1 more source

Two ways to Grid: the contribution of Open Grid Services Architecture (OGSA) mechanisms to service-centric and resource-centric lifecycles [PDF]

open access: yes, 2006
Service Oriented Architectures (SOAs) support service lifecycle tasks, including Development, Deployment, Discovery and Use. We observe that there are two disparate ways to use Grid SOAs such as the Open Grid Services Architecture (OGSA) as exemplified ...
Brebner, P., Emmerich, W.
core   +1 more source

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]

open access: yes, 2017
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou   +7 more
core   +4 more sources

RMD-QOSM: The NSIS Quality-of-Service Model for Resource Management in Diffserv [PDF]

open access: yes, 2010
This document describes a Next Steps in Signaling (NSIS) Quality-of- Service (QoS) Model for networks that use the Resource Management in Diffserv (RMD) concept.
Bader, A.   +4 more
core   +3 more sources

Container Security: Issues, Challenges, and the Road Ahead

open access: yesIEEE Access, 2019
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better microservice architecture support. The value of the container market is expected to reach $2.7 billion in 2020 as compared to $762 million in 2016.
Sari Sultan   +2 more
doaj   +1 more source

KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches

open access: yesEngineering Reports, 2019
Kubernetes, which is the most popular orchestration platform for Docker containers, is used widely for developing microservices and automating Docker instance life cycle administration.
Chin‐Wei Tien   +4 more
doaj   +1 more source

N-variant Architecture for Container Runtime Security Threats [PDF]

open access: yesJisuanji kexue
It is container technology that has promoted the development of cloud computing with its lightweight and scalability advantages,but the security threat of container runtime is increasingly serious.The existing intrusion detection and access control ...
LIU Daoqing, HU Hongchao, HUO Shumin
doaj   +1 more source

Container-based network function virtualization for software-defined networks [PDF]

open access: yes, 2015
Today's enterprise networks almost ubiquitously deploy middlebox services to improve in-network security and performance. Although virtualization of middleboxes attracts a significant attention, studies show that such implementations are still ...
Cziva, Richard   +3 more
core   +1 more source

Electronic cargo seal for safe and secure supply chain traceability [PDF]

open access: yesJournal of International Logistics and Trade, 2007
Recently, the United Statesgovernment plans to introduce electronic container seals on all imported containers as a mandatory requirement. Further, containers without electronic seals may be prohibited or restricted for import based on this planned ...
Jung Ung Min, Minyoung Park
doaj   +1 more source

Design and Implementation of 3-D Measurement Method for Container Handling Target

open access: yesJournal of Marine Science and Engineering, 2022
In the process of automatic container terminal loading and unloading, the three-dimensional attitude of the container affects the security of loading and unloading operations, so the three-dimensional attitude positioning of the container is very ...
Chao Mi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy