Application Service

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 16182 Experts worldwide ranked by ideXlab platform

Xuxian Jiang - One of the best experts on this subject based on the ideXlab platform.

  • Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann
    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • CCGRID - Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann
    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • SODA: a Service-on-demand architecture for Application Service hosting utility platforms
    High Performance Distributed Computing 2003. Proceedings. 12th IEEE International Symposium on, 2003
    Co-Authors: Xuxian Jiang, Dongyan Xu
    Abstract:

    The grid is realizing the vision of providing computation as utility: computational jobs can be scheduled on-demand at grid hosts based on available computational capacity. In this project, we study another emerging usage of grid utility: the hosting of Application Services. Different from a computational job, an Application Service such as an e-Laboratory or an on-line business has longer lifetime, and performs multiple jobs requested by its clients. A Service hosting utility platform (HUP) is formed by a set of hosts in the grid, and multiple Application Services will be hosted on the HUP. SODA is a Service-on-demand architecture that enables on-demand creation of Application Services on a HUP. With SODA, an Application Service will be created in the form of a set of virtual Service nodes; each node is a virtual machine which is physically a 'slice' of a real host in the HUP. SODA involves both OS and middleware techniques, and has the following salient capabilities: (1) on-demand Service priming: the image of an Application Service as well as the OS on which it runs will be created on-demand and bootstrapped automatically; (2) better Service isolation: Services sharing the same HUP host are isolated with respect to administration, faults, intrusion, and resources; (3) integrated Service load management: for each Service, a Service switch will be created to direct client requests to appropriate virtual Service nodes. Moreover, the Application Service provider can replace the default request switching policy with a Service-specific policy.

  • HPDC - SODA: a Service-on-demand architecture for Application Service hosting utility platforms
    High Performance Distributed Computing 2003. Proceedings. 12th IEEE International Symposium on, 2003
    Co-Authors: Xuxian Jiang, Dongyan Xu
    Abstract:

    The grid is realizing the vision of providing computation as utility: computational jobs can be scheduled on-demand at grid hosts based on available computational capacity. In this project, we study another emerging usage of grid utility: the hosting of Application Services. Different from a computational job, an Application Service such as an e-Laboratory or an on-line business has longer lifetime, and performs multiple jobs requested by its clients. A Service hosting utility platform (HUP) is formed by a set of hosts in the grid, and multiple Application Services will be hosted on the HUP. SODA is a Service-on-demand architecture that enables on-demand creation of Application Services on a HUP. With SODA, an Application Service will be created in the form of a set of virtual Service nodes; each node is a virtual machine which is physically a 'slice' of a real host in the HUP. SODA involves both OS and middleware techniques, and has the following salient capabilities: (1) on-demand Service priming: the image of an Application Service as well as the OS on which it runs will be created on-demand and bootstrapped automatically; (2) better Service isolation: Services sharing the same HUP host are isolated with respect to administration, faults, intrusion, and resources; (3) integrated Service load management: for each Service, a Service switch will be created to direct client requests to appropriate virtual Service nodes. Moreover, the Application Service provider can replace the default request switching policy with a Service-specific policy.

Dongyan Xu - One of the best experts on this subject based on the ideXlab platform.

  • Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann
    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • CCGRID - Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann
    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • SODA: a Service-on-demand architecture for Application Service hosting utility platforms
    High Performance Distributed Computing 2003. Proceedings. 12th IEEE International Symposium on, 2003
    Co-Authors: Xuxian Jiang, Dongyan Xu
    Abstract:

    The grid is realizing the vision of providing computation as utility: computational jobs can be scheduled on-demand at grid hosts based on available computational capacity. In this project, we study another emerging usage of grid utility: the hosting of Application Services. Different from a computational job, an Application Service such as an e-Laboratory or an on-line business has longer lifetime, and performs multiple jobs requested by its clients. A Service hosting utility platform (HUP) is formed by a set of hosts in the grid, and multiple Application Services will be hosted on the HUP. SODA is a Service-on-demand architecture that enables on-demand creation of Application Services on a HUP. With SODA, an Application Service will be created in the form of a set of virtual Service nodes; each node is a virtual machine which is physically a 'slice' of a real host in the HUP. SODA involves both OS and middleware techniques, and has the following salient capabilities: (1) on-demand Service priming: the image of an Application Service as well as the OS on which it runs will be created on-demand and bootstrapped automatically; (2) better Service isolation: Services sharing the same HUP host are isolated with respect to administration, faults, intrusion, and resources; (3) integrated Service load management: for each Service, a Service switch will be created to direct client requests to appropriate virtual Service nodes. Moreover, the Application Service provider can replace the default request switching policy with a Service-specific policy.

  • HPDC - SODA: a Service-on-demand architecture for Application Service hosting utility platforms
    High Performance Distributed Computing 2003. Proceedings. 12th IEEE International Symposium on, 2003
    Co-Authors: Xuxian Jiang, Dongyan Xu
    Abstract:

    The grid is realizing the vision of providing computation as utility: computational jobs can be scheduled on-demand at grid hosts based on available computational capacity. In this project, we study another emerging usage of grid utility: the hosting of Application Services. Different from a computational job, an Application Service such as an e-Laboratory or an on-line business has longer lifetime, and performs multiple jobs requested by its clients. A Service hosting utility platform (HUP) is formed by a set of hosts in the grid, and multiple Application Services will be hosted on the HUP. SODA is a Service-on-demand architecture that enables on-demand creation of Application Services on a HUP. With SODA, an Application Service will be created in the form of a set of virtual Service nodes; each node is a virtual machine which is physically a 'slice' of a real host in the HUP. SODA involves both OS and middleware techniques, and has the following salient capabilities: (1) on-demand Service priming: the image of an Application Service as well as the OS on which it runs will be created on-demand and bootstrapped automatically; (2) better Service isolation: Services sharing the same HUP host are isolated with respect to administration, faults, intrusion, and resources; (3) integrated Service load management: for each Service, a Service switch will be created to direct client requests to appropriate virtual Service nodes. Moreover, the Application Service provider can replace the default request switching policy with a Service-specific policy.

R. Eigenmann - One of the best experts on this subject based on the ideXlab platform.

  • Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann
    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • CCGRID - Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann
    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

T. Falkowski - One of the best experts on this subject based on the ideXlab platform.

  • Application Service providing as part of intelligent decision support for supply chain management
    36th Annual Hawaii International Conference on System Sciences 2003. Proceedings of the, 2003
    Co-Authors: T. Falkowski
    Abstract:

    A prominent trend in the software industry in the late 1990s was the development of the Application Service providing business model. Application Service providers (ASP) offer their customers access to software Applications via a network instead of installing them on the customer's in-house computer system. ASPs host and manage Applications from a central location and charge a fee for their Services. Nevertheless, there are currently serious reservations and myths about what ASP can mean for companies and whether it can be applied in the context of business networks. In this paper we investigate the impact of this business model on decision support technologies in the supply chain management field. Furthermore, we provide a survey of some ASP issues regarding supply chain management software.

George D. Magoulas - One of the best experts on this subject based on the ideXlab platform.

  • Evolutionary approaches to signal decomposition in an Application Service management system
    Soft Computing, 2016
    Co-Authors: Tomasz D. Sikora, George D. Magoulas
    Abstract:

    The increased demand for autonomous control in enterprise information systems has generated interest on efficient global search methods for multivariate datasets in order to search for original elements in time-series patterns, and build causal models of systems interactions, utilization dependencies, and performance characteristics. In this context, activity signals deconvolution is a necessary step to achieve effective adaptive control in Application Service Management. The paper investigates the potential of population-based metaheuristic algorithms, particularly variants of particle swarm, genetic algorithms and differential evolution methods, for activity signals deconvolution when the Application performance model is unknown a priori. In our approach, the Application Service Management System is treated as a black- or grey-box, and the activity signals deconvolution is formulated as a search problem, decomposing time-series that outline relations between action signals and utilization-execution time of resources. Experiments are conducted using a queue-based computing system model as a test-bed under different load conditions and search configurations. Special attention was put on high-dimensional scenarios, testing effectiveness for large-scale multivariate data analyses that can obtain a near-optimal signal decomposition solution in a short time. The experimental results reveal benefits, qualities and drawbacks of the various metaheuristic strategies selected for a given signal deconvolution problem, and confirm the potential of evolutionary-type search to effectively explore the search space even in high-dimensional cases. The approach and the algorithms investigated can be useful in support of human administrators, or in enhancing the effectiveness of feature extraction schemes that feed decision blocks of autonomous controllers.

  • Search-guided activity signals extraction in Application Service management control
    2014 14th UK Workshop on Computational Intelligence (UKCI), 2014
    Co-Authors: Tomasz D. Sikora, George D. Magoulas
    Abstract:

    The increased interest in autonomous control in Application Service Management-ASM environments has driven the demand for analysis of multivariate datasets in this area. Gathered metrics form time-series that can be considered as signals, which should be decomposed in order to find relations between system utilization and effective activity. This paper introduces a metrics signal deconvolution method that can be used to support human administrators or can be incorporated into feature extraction schemes that feed decision blocks of autonomous controllers. The method considers ASM environments signals decomposition as a search problem that is solved using heuristics and metaheuristic strategies. Quantitative and qualitative relations between activity and system resources signals are searched with use of a model that is based on similarity and variability of the changes, under minimal assumptions about the ASM system architecture and design. Experimental results show that the model can be successfully integrated with optimization techniques and the results produced when tested using data produced through queue modeling meet human perception of the signal unmixing problem.

  • Neural Adaptive Control in Application Service Management Environment
    Evolving Systems, 2013
    Co-Authors: Tomasz D. Sikora, George D. Magoulas
    Abstract:

    We introduce a learning controller framework for adaptive control in Application Service management environments and explore its potential. Run-time metrics are collected by observing the enterprise system during its normal operation and load tests are persisted creating a knowledge base of real system states. Equipped with such knowledge the proposed framework associates system states and high/low Service level agreement values with successful/unsuccessful control actions. These associations are used to induce decision rules, which help generating training sets for a neural networks-based control decision module that operates in the Application run-time. Control actions are executed in the background of the current system state, which is then again monitored and stored extending the system state repository/knowledge base, and evaluating the correctness of the control actions frequently. This incremental learning leads to evolving controller behavior by taking into account consequences of earlier actions in a particular situation, or other similar situations. Our tests demonstrate that this controller is able to adapt to changing run-time conditions and workloads based on SLA definitions and is able to control the instrumented system under overloading effectively.