Fresco: a Web services based framework for configuring extensible SLA management systems

Author(s):  
C. Ward ◽  
M.J. Buco ◽  
R.N. Chang ◽  
L.Z. Luan ◽  
E. So ◽  
...  
2009 ◽  
Vol E92-B (4) ◽  
pp. 1104-1111 ◽  
Author(s):  
Tomoyuki IIJIMA ◽  
Hiroyasu KIMURA ◽  
Makoto KITANI ◽  
Yoshifumi ATARASHI

2011 ◽  
Vol 2 (2) ◽  
pp. 1-12 ◽  
Author(s):  
José Paulo Leal ◽  
Ricardo Queirós

Learning management systems are routinely used for presenting, solving and grading exercises with large classes. However, teachers are constrained to use questions with pre-defined answers, such as multiple-choice, to automatically correct the exercises of their students. Complex exercises cannot be evaluated automatically by the LMS and require the coordination of a set of heterogeneous systems. For instance, programming exercises require a specialized exercise resolution environment and automatic evaluation features, each provided by a different type of system. In this paper, the authors discuss an approach for the coordination of a network of eLearning systems supporting the resolution of exercises. The proposed approach is based on a pivot component embedded in the LMS and has two main roles: 1) provide an exercise resolution environment, and 2) coordinate communication between the LMS and other systems, exposing their functions as web services. The integration of the pivot component in the LMS relies on Learning Tools Interoperability (LTI). This paper presents an architecture to coordinate a network of eLearning systems and validate the proposed approach by creating such a network integrated with LMS from two different vendors.


Cryptography ◽  
2019 ◽  
Vol 3 (3) ◽  
pp. 23
Author(s):  
Matthew Campagna ◽  
Shay Gueron

This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and in particular, the challenges that arise from using a standard mode of operation such as AES-GCM while safely supporting huge amounts of encrypted data that is (simultaneously) generated and consumed by a huge number of users employing different keys. We describe a new derived-key mode that is designed for this multi-user-multi-key scenario typical at the cloud scale. Analyzing the resulting security bounds of this model illustrates its applicability for our setting. This mode is already deployed as the default mode of operation for the AWS key management service.


Author(s):  
Jana Polgar ◽  
Robert Mark Braum ◽  
Tony Polgar

Web Services are gaining in popularity because of the benefits they provide. One of the major benefits is their support for interoperability in a heterogeneous environment, which leads to the capability to add systems and solutions that require different platforms. As long as the various systems are enabled for Web Services, the services can be used to facilitate interoperation. Web Services let enterprise application developers reuse and customize existing information assets. Web Services provide developers with standard ways to access middle-tier and back-end services, such as database management systems and transaction monitors, and to integrate them with other applications.


Sign in / Sign up

Export Citation Format

Share Document