Results 51 to 60 of about 2,951 (197)

Software‐Defined Edge Cloud Framework for Resilient Multitenant Applications

open access: yesWireless Communications and Mobile Computing, Volume 2019, Issue 1, 2019., 2019
Edge application’s distributed nature presents significant challenges for developers in orchestrating and managing the multitenant applications. In this paper, we propose a practical edge cloud software framework for deploying multitenant distributed smart applications.
Kaikai Liu   +6 more
wiley   +1 more source

Multi‐location virtual smart grid laboratory with testbed for analysis of secure communication and remote co‐simulation: concept and application to integration of Berlin, Stockholm, Helsinki

open access: yesIET Generation, Transmission &Distribution, Volume 11, Issue 12, Page 3134-3143, August 2017., 2017
The process of advancement and validation of smart grid technologies and systems calls for the availability of diverse expertise and resources. In response to this consideration, the virtual smart grid laboratory (VSGL) was developed as described in this study.
Christian Wiezorek   +6 more
wiley   +1 more source

Aplikasi Pembelajaran Menggunakan Web Server Raspberry Pi

open access: yesKomputika, 2018
Salah satu aplikasi pada website yang dibuat dalam penelitian ini adalah aplikasi pembelajaran. Aplikasi pembelajaran ini sebagai wadah penampung soal-soal pelajaran atau wadah dokumentasi soal-soal yang pernah diberikan kepada para siswa.
Syahrul Syahrul, Muhammad Syaiul Haq
doaj   +1 more source

One leak will sink a ship:WebRTC IP address leaks [PDF]

open access: yes, 2017
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use.
Al-Fannah, Nasser Mohammed
core   +2 more sources

Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1543-1564, August 2024.
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski   +3 more
wiley   +1 more source

Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling [PDF]

open access: yes, 2007
Reducing the cost for business or scientific computations, is a commonly expressed goal in today’s companies. Using the available computers of local employees or the outsourcing of such computations are two obvious solutions to save money for additional ...
Schridde, C.
core  

WLAN Integrated with GPRS Network Securely

open access: yesAl-Khawarizmi Engineering Journal, 2012
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server.
Mohammed A. Abdalla   +2 more
doaj   +2 more sources

A Performance Analysis of VPN Technologies Used in an IoT Environment

open access: yesAdvances in Electrical and Computer Engineering
Internet of Things (IoT) devices face exponential growth daily across diverse sectors. The need for robust security measures to safeguard sensitive data and ensure privacy is imminent.
HRITCAN, D.-F.   +3 more
doaj   +1 more source

DESIGN AND EVALUATION OF A VIRTUAL PRIVATE NETWORK ARCHITECTURE FOR COLLABORATING SPECIALIST USERS

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2015
The expansion of communication systems is the undeniable advantage of the most contemporary digital technologies. However, when a specialist user such as an inventor or an idea owner communicates through a communication system, their intellects are ...
Akram Kargar Raeespour   +1 more
doaj   +1 more source

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]

open access: yes, 2012
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy