technical reference model

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 123 Experts worldwide ranked by ideXlab platform

Chenggui Zhao - One of the best experts on this subject based on the ideXlab platform.

  • ICC - Cloud Computing: Security Issues Overview and Solving Techniques Investigation
    Intelligent Cloud Computing, 2015
    Co-Authors: Yu Yang, Chenggui Zhao
    Abstract:

    Cloud computing is a new computing model which uses virtualization technology, distributed computing, parallel computing and other existing technologies to achieve cloud service virtualization and economies of scale, whilst increasingly overwhelming cloud security issues has brought great challenges and concerns to the cloud services providers and cloud users, especially trust and privacy issues with regard to cloud computing and cloud shared storage associated security issues. In the paper, we expound the basic concepts of cloud computing, deployment models, service models and key features, analyze and outline the currently highlighted cloud security issues, report the status quo of cloud computing security, investigate the prevalent and typical cloud computing security problem key solving techniques, and thus render a comprehensive cloud computing security technical reference model, which is composed of associated cloud security solving techniques that result from inevitably multi-faceted cloud security issues. The model is expected to alleviate prominent cloud security issues. This paper generalizes cloud security technology research directions and further development space of cloud security technology and standardization.

  • Cloud computing: Security issues overview and solving techniques investigation
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015
    Co-Authors: Yu Yang, Chenggui Zhao, Tilei Gao
    Abstract:

    Cloud computing is a new computing model which uses virtualization technology, distributed computing, parallel computing and other existing technologies to achieve cloud service virtualization and economies of scale, whilst increasingly overwhelming cloud security issues has brought great challenges and concerns to the cloud services providers and cloud users, especially trust and privacy issues with regard to cloud computing and cloud shared storage associated security issues. In the paper, we expound the basic concepts of cloud computing, deployment models, service models and key features, analyze and outline the currently highlighted cloud security issues, report the status quo of cloud computing security, investigate the prevalent and typical cloud computing security problem key solving techniques, and thus render a comprehensive cloud computing security technical reference model, which is composed of associated cloud security solving techniques that result from inevitably multi-faceted cloud security issues. The model is expected to alleviate prominent cloud security issues. This paper generalizes cloud security technology research directions and further development space of cloud security technology and standardization.

Yu Yang - One of the best experts on this subject based on the ideXlab platform.

  • ICC - Cloud Computing: Security Issues Overview and Solving Techniques Investigation
    Intelligent Cloud Computing, 2015
    Co-Authors: Yu Yang, Chenggui Zhao
    Abstract:

    Cloud computing is a new computing model which uses virtualization technology, distributed computing, parallel computing and other existing technologies to achieve cloud service virtualization and economies of scale, whilst increasingly overwhelming cloud security issues has brought great challenges and concerns to the cloud services providers and cloud users, especially trust and privacy issues with regard to cloud computing and cloud shared storage associated security issues. In the paper, we expound the basic concepts of cloud computing, deployment models, service models and key features, analyze and outline the currently highlighted cloud security issues, report the status quo of cloud computing security, investigate the prevalent and typical cloud computing security problem key solving techniques, and thus render a comprehensive cloud computing security technical reference model, which is composed of associated cloud security solving techniques that result from inevitably multi-faceted cloud security issues. The model is expected to alleviate prominent cloud security issues. This paper generalizes cloud security technology research directions and further development space of cloud security technology and standardization.

  • Cloud computing: Security issues overview and solving techniques investigation
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015
    Co-Authors: Yu Yang, Chenggui Zhao, Tilei Gao
    Abstract:

    Cloud computing is a new computing model which uses virtualization technology, distributed computing, parallel computing and other existing technologies to achieve cloud service virtualization and economies of scale, whilst increasingly overwhelming cloud security issues has brought great challenges and concerns to the cloud services providers and cloud users, especially trust and privacy issues with regard to cloud computing and cloud shared storage associated security issues. In the paper, we expound the basic concepts of cloud computing, deployment models, service models and key features, analyze and outline the currently highlighted cloud security issues, report the status quo of cloud computing security, investigate the prevalent and typical cloud computing security problem key solving techniques, and thus render a comprehensive cloud computing security technical reference model, which is composed of associated cloud security solving techniques that result from inevitably multi-faceted cloud security issues. The model is expected to alleviate prominent cloud security issues. This paper generalizes cloud security technology research directions and further development space of cloud security technology and standardization.

Howard E Michel - One of the best experts on this subject based on the ideXlab platform.

  • A proposed API for the control plane of the WSN Integrated technical reference model (I-TRM)
    2011 8th International Conference & Expo on Emerging Technologies for a Smarter World, 2011
    Co-Authors: Babak D. Beheshti, Howard E Michel
    Abstract:

    The Integrated technical reference model (I-TRM) for an autonomous Wireless Sensor Network (WSN) has been developed to be used as a guideline to develop a unified and standardized architecture for a diverse array of multi-platform WSNs. Based on the I-TRM proposed by Michel and Fortier, there are three planes to this reference model: The Information Plane, the Control Plane and the Behavior Plane. This reference model lays out a detailed layered model with functional description of each layer described in general terms. The Control Plane puts forward the goal setting and control of the system. The main focus is on the details about the control organization of the system including hierarchical control and task distribution, in coherence to the initial work done in the field of control architecture, authentication of the semantic correctness of the goal, decomposition of valid goals into functional tasks based on knowledge about the lower layers, and organization of system tasks for goal-achievement in accordance with spatial and temporal information by decomposing the task groups into sub-tasks and assigning priorities to them. This paper presents the follow up research performed on this I-TRM, by providing a platform independent API to aid designers of WSNs to develop a codified implementation of WSNs. The API has been implemented using C in a Windows™ platform running on a standard PC/laptop, as well as portions of it in NesC in a TinyOS environment, running on the Berkeley Motes.

  • A network architecture based on information, control and behavior definitions
    CANEUS Fly by Wireless Workshop 2010, 2010
    Co-Authors: Howard E Michel
    Abstract:

    This paper envisions a plug-and-play architecture that will allow engineers to rapidly and robustly define and configure wireless systems for aircraft operations. The architecture described here is based on a layered functional decomposition of the three aspects of operations: information flow, control flow and behavior. These individual layered decompositions are presented as an integrated technical reference model (I-TRM). Having an I-TRM is crucial to developing affordable and robust systems that are self-aware, self-healing and adaptable within a resource-constrained environment.

  • Development of an intelligent wireless sensor network with mobile nodes
    Proceedings of SPIE, 2009
    Co-Authors: Joseph St. Pierre, Howard E Michel
    Abstract:

    Wireless sensor networks have become viable solutions to many commercial and military applications. This research focuses on utilizing the I-TRM to develop an architecture which supports adaptive, self-healing, and self-aware intelligent wireless sensor networks capable of supporting mobile nodes. Sensor subsystems are crucial in the development of projects to test complex systems such as the Future Combat System, a multi-layered system consisting of soldiers and 18 subsystems connected by a network. The proposed architecture utilizes the Sensor Web Enablement (SWE), a standard for sensor networks being developed by the Open Geospatial Consortium (OGC), and the Integrated technical reference model (I-TRM), a multi-layered technical reference model consisting of a behavior-centric technical reference model, information-centric technical reference model, and control technical reference model. The designed architecture has been implemented on MPR2400CA motes using the nesC programming language. Preliminary results show the architecture meets needs of systems such as the Future Combat System. The architecture supports standard and tailored sensors, mobile and immobile sensors nodes, and is scalable. Also, functionality was implemented which produces adaptive, self-healing, and self-aware behavior in the wireless sensor network.

  • Development of an embedded instrumentation system architecture and its comparison to the test and training enabling architecture
    Defense Transformation and Network-Centric Systems, 2006
    Co-Authors: Howard E Michel, Paul J. Fortier
    Abstract:

    This paper describes an information-centric embedded instrumentation systems architecture (EISA) and in particular its technical reference model (TRM) as they relate to the network-centric Test and Training Enabling Architecture (TENA). The embedded instrumentation systems architecture is meant to describe the operational, behavioral and informational requirements for a general "embedded instrumentation test and evaluation system" encased within an operational weapons system. The weapons system application could be in a weapon round, or in an entire large platform such as a warfare fighting unit, battle group or single war-craft such as a ship, plane or tank. TENA and the EISA models have much in common as will be described. The differences lie in the focus of each model's intended application domain. Both are part of the military support communities for aiding the military in training, testing, evaluating, verification or validation of weapons systems.

  • the control technical reference model
    International Conference on Artificial Intelligence, 2006
    Co-Authors: Holger Dippel, Howard E Michel
    Abstract:

    This paper proposes a new control technical reference model (C-TRM) using a layered architecture. Existing control architectures are focused on specific problems and do not provide for a general control communication from goal to task to execution. The upper layers of the C-TRM deal with the goal definition and validation. The lower layers address the goal to task translation and task execution. The C-TRM works closely together with the information-centric technical reference model (IC-TRM) to access information feedback at each layer.

Tilei Gao - One of the best experts on this subject based on the ideXlab platform.

  • Cloud computing: Security issues overview and solving techniques investigation
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015
    Co-Authors: Yu Yang, Chenggui Zhao, Tilei Gao
    Abstract:

    Cloud computing is a new computing model which uses virtualization technology, distributed computing, parallel computing and other existing technologies to achieve cloud service virtualization and economies of scale, whilst increasingly overwhelming cloud security issues has brought great challenges and concerns to the cloud services providers and cloud users, especially trust and privacy issues with regard to cloud computing and cloud shared storage associated security issues. In the paper, we expound the basic concepts of cloud computing, deployment models, service models and key features, analyze and outline the currently highlighted cloud security issues, report the status quo of cloud computing security, investigate the prevalent and typical cloud computing security problem key solving techniques, and thus render a comprehensive cloud computing security technical reference model, which is composed of associated cloud security solving techniques that result from inevitably multi-faceted cloud security issues. The model is expected to alleviate prominent cloud security issues. This paper generalizes cloud security technology research directions and further development space of cloud security technology and standardization.

Majid Gheitasi - One of the best experts on this subject based on the ideXlab platform.

  • An ICT technical reference model for Iran Universities
    Fourth International Conference on Information Technology (ITNG'07), 2007
    Co-Authors: A. .ali R Ahmadi, Farzad Soltani, Majid Gheitasi
    Abstract:

    One of the main affairs in organizations is making use of ICT tools and capabilities in order to integrate information and information systems across the organizations and increase productivity in all levels. For this, there are different enterprise architecture (EA) models, methodologies, and frameworks such as EAP, FEAF, TOGAF, etc. which contribute organizations in achieving an ICT Master Plan. Whereas these methodologies are general and they're not designed for different industries in an expert manner, therefore they might consume much time and cost and cause disintegration in being implemented. In respect to wideness of ICT development activities in organizations and also variety of industries, there is need for ICT reference models for specific industries so that we can consider all technical aspects of developing ICT in organizations and also integrate ICT developing activities to reach e-government. In this paper, we have selected an appropriate ICT technical reference model (TRM) and customized it according to Iran conditions

  • ITNG - An ICT technical reference model for Iran Universities
    Fourth International Conference on Information Technology (ITNG'07), 2007
    Co-Authors: A.r.a. Ahmadi, Farzad Soltani, Majid Gheitasi
    Abstract:

    One of the main affairs in organizations is making use of ICT tools and capabilities in order to integrate information and information systems across the organizations and increase productivity in all levels. For this, there are different enterprise architecture (EA) models, methodologies, and frameworks such as EAP, FEAF, TOGAF, etc. which contribute organizations in achieving an ICT Master Plan. Whereas these methodologies are general and they're not designed for different industries in an expert manner, therefore they might consume much time and cost and cause disintegration in being implemented. In respect to wideness of ICT development activities in organizations and also variety of industries, there is need for ICT reference models for specific industries so that we can consider all technical aspects of developing ICT in organizations and also integrate ICT developing activities to reach e-government. In this paper, we have selected an appropriate ICT technical reference model (TRM) and customized it according to Iran conditions